Monday, February 3, 2020

Social Media Individual Assignment Essay Example | Topics and Well Written Essays - 500 words - 1

Social Media Individual Assignment - Essay Example These regulations could also be functional to social networks. The following are a list of guidelines firms can use to check social network usage in the office. 1) Competence: notify employees that they must not utilize any social media instrument unless they actually comprehend how it operates. 2) Purpose: remind workers that corporation communications and information system technology are created and purposed for work, not for individual use (Bennett 1-2). 3) Integrity: remind workers that the corporation expects moral and honest behavior from its entire staff, at all times. 4) Appropriate Content: remind workers that any digital communications and social media activities for job-associated purposes must uphold and reflect on the companys values for professionalism. 5) Confidential Information: state clearly those employees must conform to all company rules covering secret information and business secrets (Bennett 1-2). 6) Links: reprove employees not to give links to the firms int ernal or external websites from their individual social networking pages. 7) Endorsements: notify workers that posting statements concerning the companys products and services may be regarded promotion and should be authorized by firm’s officials. 8) Time: company must restrict time employees use social media network so as not to interfere with their work (Bennett 1-2). Social computing sites are a threat to security. Phishing and malware are grave worries in the customer space, and their threat handled in the corporate space (Ghandi 1-2).   Corporate social media are ideal entry points for these risks. Social media make it easier for individuals to form links, comprehend relationships and influence connections in the company (Ghandi 1-2). Yes, social media network can tarnish a firm’s reputation. Web 2.0 offers tools and chances for employees to disclose sensitive data easily, whether deliberately or not they pose risks to security. These risks

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.