Copyrighted Material
Total Page:16
File Type:pdf, Size:1020Kb
INDEX A Audits. See Social media policy audits “About Me” section, 250, 255 –256, 328 –329 Authenticity, 314 Acceptable use policies (AUPs): best practices for Automatic archiving system, 34 blog, 87; description of, 2; e-discovery of, 37; helping to manage vicarious liability, 13–14, 24, 25; media policy audit questionnaire on, B 153 –154; mobile device use, 108 –109, 118; Backup system: defi nition of, 315; ESI stored prohibiting anonymous blogging and posting, using, 33; “virtual shredding” of tape, 33 –34 223; reputation management through use of, Banning sites: German workplace practice of, 221–222; social media policy audit of your, 80; growing challenge of, 169–170. See also 139–162; testing your know-how about, 4; tips Blocking sites for blogging, 87, 95 –99. See also Best practices; Best practices: automatic archiving of ESI, 34; Sample policies; Social media policies blog policies, 87, 95 –99, 102–105; company Accident-related liability, 23, 25, 114 –118 privacy and security, 66, 80 – 81; compliance Acknowledgment form requirement, 208 –209 management, 8; compliance with international Action plan. See Social media action plan privacy laws, 14, 76, 113; a comprehensive Age Discrimination in Employment Act, 20 legal review of policy as, 231–232; content Amended Federal Rules of Civil Procedure management rules, 198 –199; effective records (FRCP), 313–314. See also Federal Rules of management team and record retention policy, Civil Procedure (FRCP) 45 – 47; effective social media policies, 87, American Management Association, 7, 19, 23, 68, 166, 180 –181; employee privacy protection, 73, 114, 118, 172, 211 68; fi nancial services industry regulatory American MedicalCOPYRIGHTED Response (AMR), 71–72 compliance, MATERIAL 59; know the state rules affecting American Recovery and Reinvestment Act your company, 39; knowing international (ARRA), 324 privacy/monitoring laws, 76; legal compliance, Americans with Disabilities Act, 20 23 –25; management of third-party comments, Anonymous blogging, 101 95 –99; management of vicarious liability risk, Anti-Defamation League, 188 13 –14; mobile devices use, 25, 110 –114, Archive: categories of, 316; defi nition of, 314 119–120; policy is essential to compliance ArcMail Technology, 44 management, 8; policy training, 212–213, Armstrong, Heather B., 320 222; private social networks, 60 – 61, 327, 331, Associated Press, 69 336; records management and e-discovery Attachment, 314 compliance, 47– 49, 327; Regulation FD 347 bbindex.inddindex.indd 334747 331/12/111/12/11 99:45:45 AAMM 348 Index compliance, 55; regulatory compliance, management by using, 227; reputation 63 – 64; reputation management, 221–229; management through monitoring of, 222–223; reviewing your ESI legal compliance, 43; self-assessing your know-how about, 84 – 87; seven-step action plan, 130 –131; social media social media policy audit on use of, 136; social and networking policies, 70 –71, 72–73, 87, media presence through, 138, 224; Technorati’s 166, 180 –181; social media policy audit, 2010 State of the Blogosphere report on, 88; 161–162; SOX compliance, 55; technological thinking before you post, 188 –191; vlog tools supporting regulatory rules, 113 –114. (video) type of, 335; web diary type of, 336; See also Acceptable use policies (AUPs); Social workplace risks of mobile, 88 –93. See also media policies Third party blog comments Blawg, 315 Blogstorms (cybersmear), 92–93, 315 –316, 318 Blocking sites: employee gripe, 223; German BP reputation attacks, 219–220 workplace practice of, 80; growing challenge Brand bloggers, 226 –227, 316 of, 169–170. See also Banning sites Breach notifi cation laws, 316 Blog policies: best practices for, 87, 95 –99, 102–105; Burson-Marsteller’s The Global Social Media creating community guidelines for, 15, 96, Check-Up, 218 171–172, 173 –174, 179–180; litigation hold, Business blogs: ensuring legal compliance, 15 –17, 325 –326; making sure that you have up-to- 24; legal liabilities triggered by, 14 date, 87; samples of different, 249–280; tips Business blogs best practices: deactivate your for managing third-party comments, 95 –99; blog’s comment function, 16 –17; establish writing rules for business bloggers, 99–102 community blogging guidelines for third Blogger written rules: adhering to FTC blogging parties, 15; requiring visitors to register before rules, 62– 63, 77, 78, 89, 101, 184, 196, commenting on your blog, 15; review third-party 223, 225 –226, 322; on banning anonymous comments prepublication, 16 blogging, 101; fi nancial, 100; on handling Business-critical email, 316 media inquiries, 100; requiring a legal Business record, 316 disclaimer, 102; reviewing posts prior to publication, 102 Bloggerati, 315 C Bloggers: “About Me” information or C-level executive blogs, 225 profi le of, 250, 255 –256, 328 –329; citizen CareerBuilder survey, 7 journalists, 317; defi nition of, 315; engaging Categories, 316 brand, 226 –227, 316; form relationships with Cell phones. See Mobile devices; Smartphones infl uential, 226 Chats, 316 –317 Blogging: banning anonymous, 223; on Chief executive offi cers (CEOs): blogs written Deepwater Horizon oil spill by “Leroy Stick,” by, 94; C-level executive blog by, 225; creating 219–220; mobile, 326 and responding to news through blogs, 95, Blogging risks: confi dentiality, 90 –91; electronic 224 –225; educating external online community discovery, 91; litigation, 88; productivity, 92; role of, 211; positioning as “thought leader,” 94; public relations disasters and blog mob attacks, written policy support by, 180 92–93; regulatory, 88 – 89; security, 89–90; Chief fi nancial offi cers (CFOs): C-level executive splog (fake blog), 89, 90; X-rated blogs, blog by, 225; positioning as “thought leader,” 94 187–188 Chief information offi cers (CIOs): C-level Blogosphere, 315 executive blog by, 225; educating external Blogroll, 315 online community role of, 211; policy on ISP Blogs: “About Me” profi le of, 250, 255 –256, connection authorization by, 303; positioning 328 –329; business, 14 –17, 24; C-level as “thought leader,” 94; as social media policy executive, 225; CEO’s ability to create and team member, 125 –126; social media risks respond to news through, 95, 224 –225; expressed by, 75–76; written policy support defi nition of, 315; dos and don’ts to manage by, 180 content, 191–198; e-discovery of, 30 – 43; Chief information security offi cers (CISOs): e-discovery risk of, 91; Federal Trade educating external online community role of, Commission (FTC) rules governing, 62– 63, 211; social media risks expressed by, 76 77, 78, 89, 101, 184, 196, 223, 225 –226, Children’s Online Privacy Protection 322; FINRA rules on, 56 –57, 89, 208, 322; Act (1998), 284 as heart of web 2.0, 83 – 84; how resentful Citizen journalists, 317 employees use, 9–10, 203 –204; how they Civil e-discovery procedures: Federal Rules can benefi t your business, 93 –95; litigation of Civil Procedure (FRCP) on, 5, 32–35; hold on, 325 –326; mobile devices used for, individual state rules on, 39– 42, 333 87–93; permalink (“permanent”) links on, Clearswift’s Web 2.0 in the Workplace Today report 327; photoblog type of, 328; reputation (2010), 2, 6, 80 bbindex.inddindex.indd 334848 331/12/111/12/11 99:45:45 AAMM Index 349 CNN, 69 Defamation: company liability for, 18; defi nition ComedyCentral.com, 170 of, 18, 319, 325; “false light,” 218; libel versus Comment spam, 89–90, 317 slander forms of, 325, 331 Comments: defi nition of, 317; risks of third party Deleted fi le, 319 blog, 30 – 43, 89–90, 95 –99, 217; threads of, Deletion schedule, 319 333 –334 Delicious, 331 Communication: how blogs facilitate two-way, Destructive retention policy, 44 – 45, 319 94; social media form of, 332; Web 2.0 form Deutscher Aktien 30 Index, 318 –319 of, 335 Digg: allowing damaging content to last forever, Communications Decency Act (1996), 217, 217; as social bookmarking site, 331; social 219, 317 media policy audit on use of, 136 Community blogging guidelines, 15, 96, Digital Millennium Copyright Act (DMCA), 171–172, 173 –174, 179–180 17–18, 25, 97–98, 319 Compliance management. See Social media Digital Sky Technologies, 57 compliance management Discrimination: job applicant screening trigging Confi dentiality: blogging risk to, 90 –91; HIPAA claims of, 19–20, 74; “protected classes” and, rule on, 60 – 62, 89, 91, 113, 184, 321, 324 –325. 19–20, 74, 329 See also Privacy; Privacy laws Domino’s employees’ YouTube, 220 Connections (LinkedIn), 317, 326 Dooced, 320 Consumer Reports 2010 “State of the Net” Doximity, 60, 320 survey, 66 “Drivers’ ed” training, 117–118 Content: defi nition of, 317–318; hidden readers Driving: Facebook posting while, 115; high cost of, 325; intended readers of, 325; rules of distracted, 115; pending legislation on cell governing, 184 –199, 206; unintended readers phone bans while, 117; vicarious liability of of, 334 accidents while, 23, 25, 114 –118 Content risks: Anthony Weiner scandal, 185; bloggers who break boundaries, 187–188; dos and don’ts to manage, 191–198; sexual E harassment, 186 –187; Tweets triggering e-Discovery: Amended Federal Rules of Civil terminations, 187; YouTube video, 188 Procedure (FRCP) application to, 314; Content rules: best practices for management blogging risk to, 91; complexity and time- of, 198 –199; compliance management role consuming task of, 35 –38; defi nition of, 30, of, 184 –185; dos and don’ts, 191–198; think 320 –321; Federal Rules of Civil Procedure before you post or publish, 188 –191; training (FRCP) for, 5, 32–35; media policy audit on, 206; understanding consequences