SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential1
98% of businesses in U.S. are using Social Media
22% of U.S. internet time is spent on Social Media
An introduction to your
Social Media
Compliance Requirements
From Julian Ranger
Chairman & Founder
Nielson NetView June 2010Software & Information Industry Association Report Feb 2013
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential2
For any one of these reasons you need:
• a Social Media Policy defining best
practice for your organisation
• a record of all social media activity
undertaken by or on behalf of your
business
• to anticipate legal & regulatory
requests
• to monitor internal activities too
#susanalbumparty
Some of the potential legal issues with SocialMedia use:
• Regulated industry compliance with regulations
• Confidentiality breaches, data protection
• Inc early release of protected information (e.g. Netflix, M&S)
• Inc customer data
• Copyright, Trademark & IP infringement
• Use of data gathered from social networks
• Privacy, defamation security, IP, employment practices
• Inappropriate use
• Libel, offensive, defamation, harassment (sexual & other),
discrimination
• Regulated inappropriate use
• Inc. Unfair promotional claims/advertising activities & disclosing
company you work for when tweet promotion or someone endorses
you for money
• CAP code & Legislation
• Sweepstakes/competition re T&Cs needed, & ensure not contravene
gambling laws
• Negligence
• Assuming a duty, not following through
• Contract implication - ending up in inadvertent enforceable contract
Example non-legal internal issues with SocialMedia use:
• Ownership of brand profiles, contacts and tome of brand
• Information leaks, confidential and sensitive
• Password security
• Rants, swearing, inappropriate comments
• Company/personal account boundaries & rules
Why is Social Media Compliance an issue you need to be aware of?
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential3
Send out messages
People engage
You respond
ASocialMediaWorkflow
Transmit Mentions Engagement
People mention you
or talk about you
You respond
What affect does this
engagement have on
you?
Record
Meet your legal
social media
archiving needs
• SMEs have a variety of tools to use to Transmit social media messages and to
monitor what others are saying about subjects of interest/their company
• However, for Engagement Monitoring there are few that cover all channels
• Those that do are generally complex and costly
• For Recording most do not provide ability to actually look at recorded data
?
?
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential4
Use SocialSafe to simplifyyourdispersed SocialMediaWorkflow
Send out messages
People engage
You respond
Transmit Mentions Engagement
People mention you
or talk about you
You respond
What effect does this
engagement have on
you?
Record
Meet your legal
social media
archiving needs
• SocialSafe creates your Business’ social media library for each user
• Every tweet, post, friend, follower, like, comment ...
• Aggregated into one private offline archive and library that you own and control
• Browsable, searchable, accessible - do more!
• Currently supports Facebook, Facebook Pages, Twitter, LinkedIn, Google+,
RSS (Blogs), Instagram, Pinterest and Viadeo
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential5
HowSocialSafeworks
Users’ content is ONLY stored on their own
PCs or Macs making SocialSafe the only
solution that fully adheres to all social
network terms of use and provides 100%
user privacy
Consolidated
library view of
all your social
network profiles
All data organised into
separate accounts/media
types and aggregated for
display & interaction
Search across
multiple social
network profiles
instantly
Plus: Insights & Collections to provide efficient tracking and
organisational tools
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential6
Calendar Journal Photos Contacts
Centralise and record allyoursocialnetwork data
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential7
Most engagement Most active Reach Export
Get Insights and monitorengagement
In our world every business can own, control
and do more with their social interactions
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential8
SocialSafewillbecomeyoursocialmedia libraryforyou andyourbusiness
Recording and engagement monitoring
foryourdispersed socialmedia users
Donna Serdula,
Founder of Vision Board Media
The mere fact that it aggregates all of your
social networks is amazing. I really love
SocialSafe for its search .. it's so hard to find
anything on Facebook
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential9
We've secured hundreds ofthousands ofsocialnetwork accounts
and are loved bythousands ofsocialmedia experts
Michelle Dear, Editor, Richmond Publishing
I honestly don't understand why your
product isn't listed as "best of the best" in
social media backup utilities
David Blumenstein,
Founder & Director of Tekworks
Thanks for helping me round up all my
social media data, its like herding cats, but
you guys let me do it economically #relief
DocMurdock, CEO of DocMurdock.com &
Former PIXAR Macintosh Systems Engineer
First Impression: HOLY CRAP!!! This ROCKS!
More later in a full review. Quick, easy...Very
COOL. Definitely DocMurdock Approved!
your library of you - socialsafe.net
© 2013 Social Safe Ltd Private & Confidential10
• You must record your social media activities and engagement
• Most tools are complex, expensive
• SocialSafe is an essential app for all social media users
• Enables assurance and compliance monitoring & enforcement
• Adheres to social network terms & condition
• Cost effective, and minimal training requirement
In Summary
• Creates an archive record of all interactions
• consolidated across multiple accounts
• available off-line
• Creates an address book of fans, followers, contacts
• Provides a search capability across all data
• Provides smart export options for analysis
Incredibly cost effective! £20 per user, per year
Recording and engagement monitoring foryoursocialmedia users

Más contenido relacionado

La actualidad más candente

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceUnified Communications Online
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlookPeter Hewer
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreSeclore
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionalsEsteban Romero Frías
 

La actualidad más candente (20)

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
SOX: A Short Guide to Compliance
SOX: A Short Guide to ComplianceSOX: A Short Guide to Compliance
SOX: A Short Guide to Compliance
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
 
HIPAA Compliance: What you need to know
HIPAA Compliance: What you need to knowHIPAA Compliance: What you need to know
HIPAA Compliance: What you need to know
 
IT Security Summit 2016
IT Security Summit 2016IT Security Summit 2016
IT Security Summit 2016
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 

Similar a SocialSafe for SMEs/SMBs - V1

SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesJulian Ranger
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Social Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and ImplicationsSocial Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and ImplicationsSocial Media Performance Group
 
Mapping the social media technology stack
Mapping the social media technology stackMapping the social media technology stack
Mapping the social media technology stackNexgate
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12Louise Spiteri
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF Social Media World Forum
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCloudIDSummit
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the BadXavier Mertens
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxT Tanujha
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011iohann Le Frapper
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseJay McLaughlin
 
MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]CanadaHelps / MyCharityConnects
 
MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]CanadaHelps / MyCharityConnects
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsMicrosoft
 

Similar a SocialSafe for SMEs/SMBs - V1 (20)

SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for Businesses
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Social Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and ImplicationsSocial Media and Enterprise Architecture - Introduction and Implications
Social Media and Enterprise Architecture - Introduction and Implications
 
Mapping the social media technology stack
Mapping the social media technology stackMapping the social media technology stack
Mapping the social media technology stack
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF
 
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the BusinessCIS13: Don't Panic! How to Apply Identity Concepts to the Business
CIS13: Don't Panic! How to Apply Identity Concepts to the Business
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
 
Social media-assessment
Social media-assessmentSocial media-assessment
Social media-assessment
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011Social Media London Presentation 5th April 2011
Social Media London Presentation 5th April 2011
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
 
MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]MyCharityConnects Toronto - Social Media Policy [2010-11-03]
MyCharityConnects Toronto - Social Media Policy [2010-11-03]
 
MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]MyCharityConnects London - Social Media Policy [2010-11-09]
MyCharityConnects London - Social Media Policy [2010-11-09]
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT Professionals
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

SocialSafe for SMEs/SMBs - V1

  • 1. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential1 98% of businesses in U.S. are using Social Media 22% of U.S. internet time is spent on Social Media An introduction to your Social Media Compliance Requirements From Julian Ranger Chairman & Founder Nielson NetView June 2010Software & Information Industry Association Report Feb 2013
  • 2. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential2 For any one of these reasons you need: • a Social Media Policy defining best practice for your organisation • a record of all social media activity undertaken by or on behalf of your business • to anticipate legal & regulatory requests • to monitor internal activities too #susanalbumparty Some of the potential legal issues with SocialMedia use: • Regulated industry compliance with regulations • Confidentiality breaches, data protection • Inc early release of protected information (e.g. Netflix, M&S) • Inc customer data • Copyright, Trademark & IP infringement • Use of data gathered from social networks • Privacy, defamation security, IP, employment practices • Inappropriate use • Libel, offensive, defamation, harassment (sexual & other), discrimination • Regulated inappropriate use • Inc. Unfair promotional claims/advertising activities & disclosing company you work for when tweet promotion or someone endorses you for money • CAP code & Legislation • Sweepstakes/competition re T&Cs needed, & ensure not contravene gambling laws • Negligence • Assuming a duty, not following through • Contract implication - ending up in inadvertent enforceable contract Example non-legal internal issues with SocialMedia use: • Ownership of brand profiles, contacts and tome of brand • Information leaks, confidential and sensitive • Password security • Rants, swearing, inappropriate comments • Company/personal account boundaries & rules Why is Social Media Compliance an issue you need to be aware of?
  • 3. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential3 Send out messages People engage You respond ASocialMediaWorkflow Transmit Mentions Engagement People mention you or talk about you You respond What affect does this engagement have on you? Record Meet your legal social media archiving needs • SMEs have a variety of tools to use to Transmit social media messages and to monitor what others are saying about subjects of interest/their company • However, for Engagement Monitoring there are few that cover all channels • Those that do are generally complex and costly • For Recording most do not provide ability to actually look at recorded data ? ?
  • 4. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential4 Use SocialSafe to simplifyyourdispersed SocialMediaWorkflow Send out messages People engage You respond Transmit Mentions Engagement People mention you or talk about you You respond What effect does this engagement have on you? Record Meet your legal social media archiving needs • SocialSafe creates your Business’ social media library for each user • Every tweet, post, friend, follower, like, comment ... • Aggregated into one private offline archive and library that you own and control • Browsable, searchable, accessible - do more! • Currently supports Facebook, Facebook Pages, Twitter, LinkedIn, Google+, RSS (Blogs), Instagram, Pinterest and Viadeo
  • 5. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential5 HowSocialSafeworks Users’ content is ONLY stored on their own PCs or Macs making SocialSafe the only solution that fully adheres to all social network terms of use and provides 100% user privacy Consolidated library view of all your social network profiles All data organised into separate accounts/media types and aggregated for display & interaction Search across multiple social network profiles instantly Plus: Insights & Collections to provide efficient tracking and organisational tools
  • 6. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential6 Calendar Journal Photos Contacts Centralise and record allyoursocialnetwork data
  • 7. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential7 Most engagement Most active Reach Export Get Insights and monitorengagement
  • 8. In our world every business can own, control and do more with their social interactions your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential8 SocialSafewillbecomeyoursocialmedia libraryforyou andyourbusiness Recording and engagement monitoring foryourdispersed socialmedia users
  • 9. Donna Serdula, Founder of Vision Board Media The mere fact that it aggregates all of your social networks is amazing. I really love SocialSafe for its search .. it's so hard to find anything on Facebook your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential9 We've secured hundreds ofthousands ofsocialnetwork accounts and are loved bythousands ofsocialmedia experts Michelle Dear, Editor, Richmond Publishing I honestly don't understand why your product isn't listed as "best of the best" in social media backup utilities David Blumenstein, Founder & Director of Tekworks Thanks for helping me round up all my social media data, its like herding cats, but you guys let me do it economically #relief DocMurdock, CEO of DocMurdock.com & Former PIXAR Macintosh Systems Engineer First Impression: HOLY CRAP!!! This ROCKS! More later in a full review. Quick, easy...Very COOL. Definitely DocMurdock Approved!
  • 10. your library of you - socialsafe.net © 2013 Social Safe Ltd Private & Confidential10 • You must record your social media activities and engagement • Most tools are complex, expensive • SocialSafe is an essential app for all social media users • Enables assurance and compliance monitoring & enforcement • Adheres to social network terms & condition • Cost effective, and minimal training requirement In Summary • Creates an archive record of all interactions • consolidated across multiple accounts • available off-line • Creates an address book of fans, followers, contacts • Provides a search capability across all data • Provides smart export options for analysis Incredibly cost effective! £20 per user, per year Recording and engagement monitoring foryoursocialmedia users