4/10/2012. W. Noel Haskins-Hafer Lead Internal Auditor Audit Innovation Leader Intuit IIA / ISACA San Diego Joint Meeting 11 April 2012.

Size: px
Start display at page:

Download "4/10/2012. W. Noel Haskins-Hafer Lead Internal Auditor Audit Innovation Leader Intuit IIA / ISACA San Diego Joint Meeting 11 April 2012."

Transcription

1 W. Noel Haskins-Hafer Lead Internal Auditor Audit Innovation Leader Intuit IIA / ISACA San Diego Joint Meeting 11 April Disclaimer Unless otherwise specified, the views expressed in this presentation are my own, and not those of any other individual or individuals connected with my current or former employers. All names, logos, and other outside material attributed to other sources remains the property of their respective copyright owners and are used here in accordance with the Fair Use doctrine. 2 1

2 Agenda Social Media Defined Risks and Opportunities in Social Media Components of a Social Media Program The Imperative To Audit Social Media 3 Assumptions Basic knowledge of tools and concepts of social media Understanding of auditing techniques and practices Recognition that no two audit programs are exactly alike 4 2

3 5 Social Media Defined The use of web-based and mobile technology to enable interactive communication between, across and about people, organizations and communities Social media is about sociology and psychology more than technology Brian Solis, Principal of FutureWorks and author of Engage! 6 3

4 Social Media Expectations Dialog Active contribution Viral distribution of content Customization of technologies and interfaces to suit the users Social media is social because it works best when you are having a conversation 7 Social Media Uses and Benefits Brand Sales Service Innovation Recruit Build and maintain reputation Find and communicate with customers Increase customer loyalty Develop, market and promote products and services Increase productivity, creativity and innovation Recruit new employees and suppliers Build the team regardless of location Share knowledge Find funding Essentially, to improve processes and results Adapted from Peter Scott and J. Mike Jacka, Auditing Social Media: A Governance and Risk Guide (Institute of Internal Auditors Research Foundation, 2011) 8 4

5 The Social Shift Yesterday Institutions, platforms, technology set the rules Structured Siloed One size fits all Passive audience Unilateral Today Users, communities and experiences rule Constantly changing Flexible Collaborative Engaged users Multilateral Social Media is a fundamental shift in the way we communicate 9 Adapted from Managing Social Media Risk (IIA-SF presentation, March 2012) The Social Media Program Challenge How to be sensible and prudent in managing the risks Lewis Segall, Sr. Corporate Counsel, Google Shop Talk: Compliance Risks in New Data Technologies Compliance Week July 7,

6 Social Media Program Risks Loss of reputation Low level of messaging and content control Inappropriate or unapproved use of company IP (logos, trademarks, brand names) Disclosure of IP, personal and sensitive data Social engineering Compromised competitive advantage Compliance violations Dissatisfied customers and mass-produced customer service Loss of productivity 11 How Bad Is It? Average company polled experienced 9 social media incidents in 12 months prior to the poll 94% suffered negative consequences Per company recovery costs were $4 million Top Incidents Employees sharing too much information in public forums (46%) Loss or exposure of confidential or proprietary information (41%) Embarrassment or damage to brand or reputation (41%) Increased exposure to litigation (37%) Violation of regulatory rules (36%) Education and Training are Key to Proper Use of Social Media Symantec Social Media Protection 2010 Flash Poll

7 You Make The News For Not doing due diligence before launching social media campaigns Not creating and communicating social media policies Not managing social media as a core programnot monitoring the social media space appropriately Growing sales instead of building relationships Not training employees on social media awareness Not complying with relevant laws and regulations And sometimes, for doing something right 13 Audit Objective To provide management with an independent assessment relating to the effectiveness of controls over the enterprise s social media policies, program and processes Adapted from Social Media Audit/Assurance Program (ISACA 2011) 14 7

8 Key Areas to Audit Strategy Governance and compliance Processes, including Internal and external policies and program execution Metrics and monitoring Third party relationship management People Training and awareness Recruiting and work force management 15 Key Areas to Audit, continued Technology Information systems operations Network management Third party management Information security and privacy Let s Get Started! 16 8

9 Getting Started Understand the business and culture Determine the objectives, scope, model and placement of the social media program Identify key players, roles and responsibilities Inventory the social media projects Categorize and prioritize social media channels used Map out key interactions between departments and third parties Understand compliance requirements, including archiving What should we look for? 17 SM Strategy Best Practices Is led by an executive champion Provides direction for all stakeholders Defines social media program model Aligns with business objectives Aligns with organization s other strategies Identifies metrics to measure effectiveness Is pervasive and integrated throughout the business Defines target audiences and channels Is adequately funded and staffed 18 9

10 SM Governance Audit Best Practices Defines appropriate policies for social media Establishes social media program oversight responsibility Board-level awareness Qualified program champion Effective oversight for all social media use Program monitoring and reporting Balances risks and opportunities Includes effective oversight for social media use Management awareness and monitoring Responses to social media events 19 from Social Media and the Talent Landscape: What HR Needs to Know about Social Media (Manpower US March 30, 2012) 20 10

11 SM Compliance Best Practices Identifies all relevant laws and regulations Local and global PCI and other relevant standards Recognizes how social media increases compliance efforts Extends compliance, supervision and surveillance practices to interactive content Monitors social media use for violations Monitors compliance environment for potential changes related to social media Includes guidance for collecting and archiving social media content and activities (e-discovery) 21 By 2013, 50% of all companies will have been asked to produce material from social media websites for e-discovery. Social Media Governance: An Ounce of Prevention Gartner, December 17,

12 SM Policy Best Practices Aligns with business objectives, culture and core values Defines platforms, formats and tools used to support social media Stakeholders Social media initiatives, including crisis communication Outlines monitoring practices for social media conversations Information collected Competition monitoring Reputational risk monitoring Defines management reporting Covers both internal and external constituencies Vetted by key players in the organization 23 Internal Social Media Policy Defines what workers and 3 rd parties may and may not do both professionally and personally Establishes workers expectation of privacy Discloses what the organization will do Monitor, curate, investigate, discipline, terminate Location expectations 24 12

13 External Social Media Policy Discloses organization s sites and account names used Defines acceptable use and content on organization s online sites Discloses what the organization will do Monitor, curate, investigate, litigate Account and content banning Defines SLAs Hours Response time Error correction 25 Overlapping Policies These should incorporate social media IT compliance policies and controls Employee conduct Harassment Ethics Confidentiality and IP Third Party policies and agreements 26 13

14 SM Policy Team Executive champion Marketing Public Relations Human Resources Information Technology and Security Product Development Customer Service Legal Risk Management 27 SM Metrics Best Practices Provide insights into success and failure of social media activities Align with business objectives Are consistent across business units Are defined for each social media initiative Are both qualitative and quantitative measures Support regulatory compliance requirements Are shared with business units and social media champion Social is measured in Relationship Building Not in Units Sold 28 14

15 Intuit HR Social Media Metrics from Social Media and the Talent Landscape: What HR Needs to Know about Social Media (Manpower US March 30, 2012) 29 74% of working Americans believe it is easy to damage a brand s reputation via social media sites. Social Networking And Reputational Risk In The Workplace Deloitte LLP, July

16 Who Controls Reputation? 34% of bloggers post opinions on products and brands 90% of consumers trust peer recommendations 14% trust advertisements From Eric Qualman s Social Media Revolution 3 You have to earn the like (and manage detractors) 31 SM Monitoring Best Practices Encompasses active listening, monitoring and responding Includes processes and tools for monitoring communications Keywords, topics and issues Trend analysis and comparison Competitive intelligence Gives customers an opportunity to provide insight and feedback Uses those comments to improve products, services and processes Matches customers preferred communication methods and styles Provides guidance for responding to issues Social Media Triage Chart 32 16

17 33 SM Third Party Management Best Practices Recognizes all relevant content may not be in control of the social media program Includes cross-functional review of contracts for social media relevance Provides guidance on how contracts and agreements affect organization s operations, risk and compliance positions Includes risk assessments for third parties Addresses organization s requirements for records retention 34 17

18 What are SM users doing? 64% click on links even if they don t know where the links will take them >50% let friends access social networks on their computers 47% have been infected by malware 26% share files within the social network 21% accept contact offerings from strangers 20% have experienced identify theft 35 SM Training Best Practices Required at least annually Offered enterprise-wide Incorporates awareness campaigns Includes additional training for core social media team Covers: Social media roles, responsibilities and expectations Especially for crisis communications Level of representation for the company Relevant policies and best practices Social media rules of the road Social engineering, security, privacy and data protection Guidance for triaging and responding 36 18

19 Managing Social Media Risk (IIA-SF presentation, March 2012) 37 SM Technical Best Practices Monitors for Malware and viruses Data leakage/theft Owned systems (zombies) System downtime Recovery resources Brand hijacking Customer backlash/adverse legal reaction Data exposure Reputation Targeted phishing 38 19

20 More SM Technical Best Practices Documents how customer interactions are integrated with existing systems and databases Clearly defines interfaces with customer and third party systems Includes alerting tools for key topics, comments, commentators and sentiment of activity Use the Best Practices to guide audit inquiry and testing 39 Overwhelmed? You can do this Standard audit concepts still rule Focus on balancing opportunities and risks Remember the social media uses and benefits Use Best Practices as template for audit inquiry and testing COSO still matters The same laws apply You will make a difference 40 20

21 Questions & Responses

22 References and Recommended Readings Peter Scott and J. Mike Jacka, Auditing Social Media: A Governance and Risk Guide(Institute of Internal Auditors Research Foundation, 2011) Social Media and the Talent Landscape: What HR Needs to Know about Social Media(Manpower US March 30, 2012) Social Media Governance: An Ounce of Prevention (Gartner, December 17, 2010) Social Networking And Reputational Risk In The Workplace (Deloitte LLP, July 2009) Advocacy Drives Growth (London School of Economics, 2005) theultimatequestion.com (Bain & Company, 2006) Eric Qualman, Social Media Revolution 3 ( Social Media Starter Kit (manpowerblogs.com/toth) Compliance in the Age of Social Media (Compliance Week, November 2011) Social Media Audit/Assurance Program (ISACA, 2011) Social Media: Business Benefits and Security, Governance and Assurance Perspectives (ISACA 2010) Social Media Triage Chart ( Managing Risk in a Social Media-Driven Society (Protiviti, 2011) Brian Solis & JESS3, The Conversation Prism ( Blog Assessment, Dell Social Media Risks and Mitigations (BIITS The Financial Services Roundtable, June 2011) Managing Social Media Risk (IIA-San Francisco presentation, March 2012) 43 Social Media Policy Guidelines Tie to vision + code + handbook Set clear and reasonable expectations Define social media broadly Protect trade secrets Clarify who owns what Ban disparagement / harassment Respect copyrights Include NLRA disclaimer Impose duty to report violations Include consequences Enforce up to and including discharge 44 22

23 Social Communications Policy Framework Who may participate in organization s Social Media program When and why to participate Guiding Principles Disclose affiliations Clearly state when you re talking for the company or yourself Pay attention to tone of voice Be aware of language usage and interpretation Comply with Code of Conduct Be accurate and honest Awareness of potential to be held responsible for unsubstantiated or misleading claims and endorsements Could include liking and friending Don t disclose personal or confidential information Think before posting Instructions for dealing with media, bloggers, and other outsiders 45 Electronic Communications Policy Content Population covered by policy Equipment covered Devices Networks Guardrails for electronic communications Professional, courteous, law-abiding Protect confidential information Expectation of privacy Appropriate use of media and devices What organization may do Monitor, block, modify, delete When and under what circumstances Filtering Protection of confidential information and trade secrets Define confidential information Check distribution lists for need to know Be aware of international laws Attorney Client Privilege considerations Tie in with Code of Conduct, Non-Disclosure Agreement, Intellectual Property Agreements Consequences of non-compliance Responsibilities & Points of contact for additional information and guidance 46 23

24 Social Media Content Best Practices Add value Conversational style Honesty and respect Transparency and disclosure Confidentiality / PII Ownership and property registration Endorsements and recommendations Boundaries of personal and professional use What you can and can t disclose 47 Organizational Models Organic Growth from several sources in the organization Inconsistent user experience (reputational risk) Centralized Social media managed from one department Good for highly regulated industries Risk: Social media becomes just another distribution point Coordinated Multiple sources coordinated through a committee Risk: information hoarding rather than enabler Hub and Spoke Autonomous groups with guidelines for common experience Good for organizations spanning cultures, languages and governments Risk: costly, requires excellent intra-organizational communications Honeycomb Requires organization to embrace social media as core to business Everyone actively participates in social media Risk: cultural commitment and extensive training and support From Auditing Social Media: A Governance and Risk Guide Peter R. Scott & J. Mike Jacka Institute of Internal Auditors Research Foundation,

25 The Conversation Prism Brian Solis & JESS

26 51 Brand Awareness & Advocacy - Use Stakeholder education Community development Subject matter expertise Product sampling and reviews Advocacy development Promotions and contests Crisis communications Reputation management Adapted from Evaluating Your Organization s Social Media Efforts (IIA Webinar series, October 2011) 52 26

27 Brand Metrics Stakeholder Engagement Advocate Engagement Share of Voice Sentiment Fans & Follower Count Common, but does not fully measure engagement Adapted from Evaluating Your Organization s Social Media Efforts (IIA Webinar series, October 2011) 53 Sales -Use Channel-only specials Lead generation E-commerce / F-commerce Profile updates Mobile promotions Adapted from Evaluating Your Organization s Social Media Efforts (IIA Webinar series, October 2011) 54 27

28 Sales - Metric Leads generated Revenue from social media activities Customer Lifetime Value New customer acquisition Customer purchase patterns Repeat business Product patterns Average purchase amount Adapted from Evaluating Your Organization s Social Media Efforts (IIA Webinar series, October 2011) 55 Customer Service - Use Customer problem resolution Chat Community or P2P service Adapted from Evaluating Your Organization s Social Media Efforts (IIA Webinar series, October 2011) 56 28

29 Customer Service - Metrics Issue submission percentage Issue resolution rate Issue resolution time Financial Impact Customer satisfaction rate Advocate engagement rate and sentiment Peer-to-Peer interaction and voice Evaluating Your Organization s Social Media Efforts (IIA Webinar series, October 2011) 57 Innovation - Use Idea sourcing Competitive Intelligence Feedback Co-creation Adapted from Evaluating Your Organization s Social Media Efforts (IIA Webinar series, October 2011) 58 29

30 Innovation - Metrics Issues reported Number of conversations Ideas submitted Idea and Issue Impact Financial impact Evaluating Your Organization s Social Media Efforts (IIA Webinar series, October 2011) 59 Recruitment - Use Employee empowerment Organizational culture Organizational insights Candidate identification and nurturing Employee alumni Adapted from Evaluating Your Organization s Social Media Efforts (IIA Webinar series, October 2011) 60 30

31 Recruitment - Metrics Potential candidate engagement New hire rate Social Media-sourced employee retention rate Financial impact of recruiting through social media Employee sentiment Employee reach, influence and impact Evaluating Your Organization s Social Media Efforts (IIA Webinar series, October 2011) Strategy Social Media Governance Review the social media strategy, program goals, and organization model. Assess if these have been formalized and communicated to all relevant teams. Evaluate alignment of the strategy with company goals. Policy Review the social media policy and confirm that elements related to disclosure, ethics, community and privacy are included. Identify gaps and test awareness of the policy. Roadmap Assess the adequacy of the social media roadmap, including if it is global / localized and whether short-term and long-term program milestones have been defined. Team Structure Assess if roles of key owners and stakeholders in the social media program are defined and clearly communicated (e.g. executive sponsorship, communications / PR, employees, Legal, IT, Support, R&D, Product, etc). Managing Social Media Risk (IIA-SF presentation, March 2012) 31

32 63 Preparedness and Response Customer Profiles and Market Analyses: Review customer profile and market analyze Evaluate if all products are covered, the appropriate target customers have been identified, including the desired relationship and engagement model. Tools and Analytics: Understand how customer interactions via social media are integrated with internal infrastructure (databases, systems, processes) Assess process and tools for identifying key topics, comments, commentators, and sentiment from website activity. Evaluate KPIs and metrics against best practices and alignment of metrics with the social media strategy. Processes: Test the policies and procedures to verify messaging is consistent with the social media strategy / plan. Review and test policies, processes and procedures used for triage, crisis response, intake and response to customer insights. Understand how customer insights are monitored, tracked, and shared with relevant teams (product marketing, R&D, Support, etc) for action. Managing Social Media Risk (IIA-SF presentation, March 2012) Education Training and Education Evaluate the types of training programs implemented to share best practices and rules of the road within the social media team Understand how social media best practices are shared cross functionally with other functions in the organization, such as recruiting, sales, product, etc. Compliance Monitoring and Compliance Understand whether compliance with the social media policy is monitored both internally and externally Perform procedures to test compliance with the social media policy within selected social media tools 64 Managing Social Media Risk (IIA-SF presentation, March 2012) 32

33 Training Best Practice Examples Intel s Digital IQ program Beginning: Raise awareness of social media policy Now: 60 online courses 6,000 employees completed 2,000 courses Rebecca Brown, Directory of social media strategy, Intel Monthly newsletter Program updates Best practices Updates from Social Media Professionals Coca Cola Employees may participate freely after taking a certification program Best Buy Twelpforce volunteers must be trained before becoming an agent 65 HR Laws in Social Media Discrimination National Labor Relations Act Fair Credit Reporting Act (FCRA) Genetic Information Nondescrimination Act (GINA) Negligent hiring Off-duty conduct Arrest records Background check information Ultimate test: Is it job related? Adapted from Social Media and the Talent Landscape: What HR Needs to Know about Social Media (Manpower US March 30, 2012) 66 33

34 HR Stay out of Court Basics Know the law Adopt and consistently enforce a reasonable policy Consider social media and employment agreements Who owns terminated employees followers? (PhoneDog.com) Limit the number of searchers, managers, and 3 rd Parties Maintain segregation of duties for search and hiring Train searchers and managers Make sure they understand the value of maintaining good documentation Adapted from Social Media and the Talent Landscape: What HR Needs to Know about Social Media (Manpower US March 30, 2012) 67 Suggested COBIT v4.1 Processes PO1 Define a strategic IT plan PO2 Define the information architecture PO4 Define the IT processes, organization and relationships PO6 Communicate management aims and directions PO7 Manage IT human resources PO9 Assess and manage IT risks DS2 Manage third party services DS5 Ensure systems security DS8 Manage service desk and incidents DS7 Educate and train users ME3 Ensure compliance with external requirements ME4 Provide IT governance Derived from Social Media Audit/Assurance Program (ISACA 2011) 68 34

W. Noel Haskins-Hafer CISA, CISM, CGEIT, CRISC, CRMA, CFE, SCPM Compliance Program Manager Intuit Consumer Ecosystems Group IIA Orange County / ISACA

W. Noel Haskins-Hafer CISA, CISM, CGEIT, CRISC, CRMA, CFE, SCPM Compliance Program Manager Intuit Consumer Ecosystems Group IIA Orange County / ISACA W. Noel Haskins-Hafer CISA, CISM, CGEIT, CRISC, CRMA, CFE, SCPM Compliance Program Manager Intuit Consumer Ecosystems Group IIA Orange County / ISACA Orange County Spring Educational Conference 13 March,

More information

Social Media and the Talent Landscape: What HR Needs to Know About Social Media

Social Media and the Talent Landscape: What HR Needs to Know About Social Media To download today s materials, please visit: www.manpower.us/materials Social Media and the Talent Landscape: What HR Needs to Know About Social Media Tuesday, March 20, 2012 Innovative Workforce Solutions

More information

Social Media Assessment. Khalid Wasti Deloitte & Touche LLP December 11, 2012

Social Media Assessment. Khalid Wasti Deloitte & Touche LLP December 11, 2012 Social Media Assessment Khalid Wasti Deloitte & Touche LLP December 11, 2012 http://www.youtube.com/watch?v=0euel3n7fds Contents Overview of social media Social media opportunities Social media risks Regulatory

More information

Social Networking and its Implications on your Data Security

Social Networking and its Implications on your Data Security Social Networking and its Implications on your Data Security Canadian Chamber of Commerce of the Philippines June 8, 2011 Warren R Bituin Partner -SGV & Co. About the Speaker Warren R. Bituin SGV & Co./Ernst

More information

ASAE s Job Task Analysis Strategic Level Competencies

ASAE s Job Task Analysis Strategic Level Competencies ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management

More information

Competency Requirements for Executive Director Candidates

Competency Requirements for Executive Director Candidates Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives

More information

Social Media Marketing Best Practices

Social Media Marketing Best Practices Social Media Marketing Best Practices Distributed at Igniting Opportunities: Measuring and Monetizing Social Media Presented by The Council of PR Firms and The Social Media Society Hosted by Davis & Gilbert

More information

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk A Hootsuite & Nexgate White Paper Mapping Organizational Roles & Responsibilities for Social Media Risk Executive Summary

More information

Software as a Service: Guiding Principles

Software as a Service: Guiding Principles Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

Communications Council Best Practice Guide

Communications Council Best Practice Guide Communications Council Best Practice Guide Social Media Code of Conduct social media code of conduct Purpose In the past few years social media has become an important and integral part of the marketing

More information

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015 Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key

More information

Iowa County Government Social Media Use Policy

Iowa County Government Social Media Use Policy Iowa County Government Social Media Use Policy This policy outlines appropriate use of social media, as it relates to Iowa County, by employees and departments for official and personal use. This policy

More information

How To Use Social Media For A University

How To Use Social Media For A University SOCIAL MEDIA AT BLOOMSBURG UNIVERSITY Guidelines for University Communications and Marketing Professionals October 2010 These guidelines were created by Bloomsburg Office of Marketing and Communications.

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Social Media And the Workplace. Scott Patterson Labor and Employment Attorney Butzel Long

Social Media And the Workplace. Scott Patterson Labor and Employment Attorney Butzel Long Social Media And the Workplace Scott Patterson Labor and Employment Attorney Butzel Long POTENTIAL ISSUES Employee productivity Harassment and discrimination Too much information Legal issues POTENTIAL

More information

Social Media Policy. Fairfield County

Social Media Policy. Fairfield County Social Media Policy Fairfield County February 2014 Page 1 of 12 Table of Contents Overview... 3 Guidelines... 4 Responsibility... 4 Standard practices... 7 Training... 7 Branding... 7 Implied endorsements...

More information

HOWARD UNIVERSITY POLICY

HOWARD UNIVERSITY POLICY HOWARD UNIVERSITY POLICY Policy Number: 700-001 Policy Title: SOCIAL MEDIA Responsible Officer: Executive Director of University Communications Responsible Office: Office of the President Effective Date:

More information

Managing Social Media Employment Issues

Managing Social Media Employment Issues Managing Social Media Employment Issues October 1, 2013 Katie Carder McCoy 206.447.2880 cardk@foster.com Presentation Outline: What is social media and who cares? Risks of employer-sponsored social media,

More information

The New World of Social Media: Business and Legal Risks

The New World of Social Media: Business and Legal Risks March 2, 2010 The New World of Social Media: Business and Legal Risks Call-In Details: United States/Canada: 1-800-214-0694 All other countries: 1-719-955-1425 Participant Passcode: 165381 www.marsh.com

More information

Social in the Enterprise

Social in the Enterprise Social in the Enterprise TEPEE AGENDA - Social in the Enterprise Definition Value Proposition Implementation Change Management Governance TEPEE 2 Definition Social Media Defined the use of web-based and

More information

NEW YORK STATE-WIDE PAYROLL CONFERENCE. Presented to:

NEW YORK STATE-WIDE PAYROLL CONFERENCE. Presented to: NEW YORK STATE-WIDE PAYROLL CONFERENCE Presented to: Felicia Cheek, Practice Leader Global Time to Pay Advisory 15 September 2014 Statement of Confidentiality and Usage Restrictions This document contains

More information

WHITE PAPER Social Media In Technology. A Unified Strategy for Success

WHITE PAPER Social Media In Technology. A Unified Strategy for Success WHITE PAPER Social Media In Technology A Unified Strategy for Success Social Media In Technology A Unified Strategy for Success Technology companies pride themselves on being early adopters of the newest

More information

SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS

SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS Nipul Patel, Purdue University North Central, npatel@pnc.edu Hetal Jasani, Northern Kentucky University, jasanih1@nku.edu ABSTRACT The introduction

More information

Best Practices for the Use of Social Media Summer 2011. Belmont University Athletics

Best Practices for the Use of Social Media Summer 2011. Belmont University Athletics Best Practices for the Use of Social Media Summer 2011 Belmont University Athletics Overview The rapid growth of social media technologies combined with their ease of use and pervasiveness make them attractive

More information

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Internet Reputation Management Guidelines Building a Roadmap for Continued Success Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.

More information

5 TIPS FOR SETTING MEASURABLE SOCIAL MEDIA GOALS

5 TIPS FOR SETTING MEASURABLE SOCIAL MEDIA GOALS TIP SHEET 5 TIPS FOR SETTING MEASURABLE SOCIAL MEDIA GOALS Social media participation has become a must for businesses today. A survey by CMO in February 2012 revealed that marketers expect to spend almost

More information

How do members of the MSU community engage online? What it means to engage online is no different than what it means to engage offline.

How do members of the MSU community engage online? What it means to engage online is no different than what it means to engage offline. PAGE 1 OF 7 Introduction The Michigan State University (MSU) Guidelines for Social Media apply to Michigan State University faculty, staff, and student employees and interns who create or contribute to

More information

Social Media Guidelines

Social Media Guidelines MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with

More information

Social Media in the Workplace: Strategies for Managing Compliance Risk

Social Media in the Workplace: Strategies for Managing Compliance Risk : Strategies for Managing Compliance Risk SCCE Compliance and Ethics Institute Washington DC October 8, 2013 In this session, we will discuss: The growth of social media in the workplace and the opportunities

More information

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This

More information

How To Listen To Social Media

How To Listen To Social Media WHITE PAPER Turning Insight Into Action The Journey to Social Media Intelligence Turning Insight Into Action The Journey to Social Media Intelligence From Data to Decisions Social media generates an enormous

More information

AT&T s Code of Business Conduct

AT&T s Code of Business Conduct August 2015 AT&T s Code of Business Conduct To All AT&T Employees Worldwide: The most basic commitment we make to our customers, our shareholders, and each other is to always conduct ourselves in an ethical

More information

Agent Social Media Policy

Agent Social Media Policy Agent Social Media Policy Addendum to the Agent Advertising Guidelines November 2013 For agent use only. not to be used for consumer solicitation purposes. Addendum to Agent Advertising Guidelines Agent/Producer

More information

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company

More information

HUMAN SERVICES MANAGEMENT COMPETENCIES

HUMAN SERVICES MANAGEMENT COMPETENCIES HUMAN SERVICES MANAGEMENT COMPETENCIES A Guide for Non-Profit and For Profit Agencies, Foundations and Academic Institutions Prepared by: Anthony Hassan, MSW, Ed.D. William Waldman, MSW Shelly Wimpfheimer,

More information

How To Use Social Media At St James Anglican School

How To Use Social Media At St James Anglican School P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :

More information

Business Ethics and Code of Conduct. Executives and employees. Global Connections Pcl.

Business Ethics and Code of Conduct. Executives and employees. Global Connections Pcl. Business Ethics and Code of Conduct. Executives and employees. Global Connections Pcl. Update on December 2013 Page 2 of 12 Contents. Subject Page Introduction 4 The aim of the company 4 Treatment of Stakeholders

More information

Getting Business Value from Customer Engagement. Chet Geschickter, Research Director Gartner Energy & Utilities Industries Research

Getting Business Value from Customer Engagement. Chet Geschickter, Research Director Gartner Energy & Utilities Industries Research Getting Business Value from Customer Engagement Chet Geschickter, Research Director Gartner Energy & Utilities Industries Research 1 How Gartner Delivers Value Gartner research helps clients review, develop,

More information

When soliciting constituent comments to include discussions, State agencies must:

When soliciting constituent comments to include discussions, State agencies must: 7.13 Social Media The purpose of policy 7.13 Social Media is to assist departments who participate in Internet-based social media outlets to be effective and conscious while using the resources of social

More information

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk

More information

How To Create A Social Media Program

How To Create A Social Media Program ENGAGING CUSTOMERS WITH SOCIAL MEDIA A CLARABRIDGE WHITE PAPER EXECUTIVE SUMMARY For a growing number of consumers, social media is the preferred means of gathering product information and interacting

More information

How To Use Social Media To Improve Your Business

How To Use Social Media To Improve Your Business IBM Software Business Analytics Social Analytics Social Business Analytics Gaining business value from social media 2 Social Business Analytics Contents 2 Overview 3 Analytics as a competitive advantage

More information

The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012

The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012 The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only Agenda Introduction Basic program components Recent trends in higher education risk management Why

More information

www.pwc.com Cybersecurity and Privacy Hot Topics 2015

www.pwc.com Cybersecurity and Privacy Hot Topics 2015 www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets

More information

CUSTOMER SERVICE MEETS SOCIAL MEDIA: BEST PRACTICES FOR ENGAGEMENT

CUSTOMER SERVICE MEETS SOCIAL MEDIA: BEST PRACTICES FOR ENGAGEMENT CUSTOMER SERVICE MEETS SOCIAL MEDIA: BEST PRACTICES FOR ENGAGEMENT 2009 RightNow Technologies. All rights reserved. RightNow and RightNow logo are trademarks of RightNow Technologies Inc. All other trademarks

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

The Role of the Board in Enterprise Risk Management

The Role of the Board in Enterprise Risk Management Enterprise Risk The Role of the Board in Enterprise Risk Management The board of directors plays an essential role in ensuring that an effective ERM program is in place. Governance, policy, and assurance

More information

Communications Council Best Practice Guide Social Media and Online Commentary Code of Conduct

Communications Council Best Practice Guide Social Media and Online Commentary Code of Conduct Communications Council Best Practice Guide Social Media and Online Commentary Code of Conduct Revised Mar 13 2015 social media and online commentary code of conduct Purpose In the past few years social

More information

FINRA Publishes its 2015 Report on Cybersecurity Practices

FINRA Publishes its 2015 Report on Cybersecurity Practices Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February

More information

Holyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012

Holyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012 Holyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012 Introduction Social media offers HCC a tremendous opportunity to connect with and better

More information

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners Agile Master Data Management TM : Data Governance in Action A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary What do data management, master data management,

More information

Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY

Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY Sutter Health and Affiliates Administrative Policies and Procedures SOCIAL MEDIA POLICY Communications & Marketing Policy 12-745 Approved by: System Management Team Origination Date: 08/2009 Revised Date:

More information

CFPB COMPLIANCE: Interaction Between Compliance Assessments and Systems Issues

CFPB COMPLIANCE: Interaction Between Compliance Assessments and Systems Issues CFPB COMPLIANCE: Interaction Between Compliance Assessments and Systems Issues Presented by: Stefanie H. Jackman Consumer Financial Services Group 678.420.9490 jackmans@ballardspahr.com Trevor Salter Consumer

More information

Government Communication Professional Competency Framework

Government Communication Professional Competency Framework Government Communication Professional Competency Framework April 2013 Introduction Every day, government communicators deliver great work which supports communities and helps citizens understand their

More information

The Evolution of HR Audits

The Evolution of HR Audits Laurdan Associates, Inc. Editorial for HRM Website The Evolution of HR Audits Evolution is a process of change. Over the last 25 years we have seen significant change in the HR auditing process, the value

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

Sample risk committee charter

Sample risk committee charter Sample risk committee charter 1 Next This sample risk committee charter is based on leading practices observed by Deloitte in the analysis of a variety of materials. It is important to note that the Risk

More information

Agenda Overview for Customer Experience, 2015

Agenda Overview for Customer Experience, 2015 G00270544 Agenda Overview for Customer Experience, 2015 Published: 22 December 2014 Analyst(s): Jake Sorofman Customer experience has emerged as a top priority for marketers. This overview summarizes how

More information

Voice. listen, understand and respond. enherent. wish, choice, or opinion. openly or formally expressed. May 2010. - Merriam Webster. www.enherent.

Voice. listen, understand and respond. enherent. wish, choice, or opinion. openly or formally expressed. May 2010. - Merriam Webster. www.enherent. Voice wish, choice, or opinion openly or formally expressed - Merriam Webster listen, understand and respond May 2010 2010 Corp. All rights reserved. www..com Overwhelming Dialog Consumers are leading

More information

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010

More information

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT Through CGIAR Financial Guideline No 3 Auditing Guidelines Manual the CGIAR has adopted the IIA Definition of internal auditing

More information

Course Descriptions for the Business Management Program

Course Descriptions for the Business Management Program Course Descriptions for the Business Management Program Upon completion of two quarters, students will earn a Professional Certificate in Business Management with a specialization in a chosen area: HR,

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

How To Manage Social Media In The Workplace

How To Manage Social Media In The Workplace SHRM Foundation Executive Briefing Social Media in the Workplace: Issues and Strategic Questions By Robert E. Ployhart, Ph.D. sponsored by Spherion Social media is revolutionizing the way people connect

More information

Enterprise Social Media Marketing Software. Evaluation and Selection Guide

Enterprise Social Media Marketing Software. Evaluation and Selection Guide Enterprise Social Media Marketing Software Evaluation and Selection Guide Summer/Fall 2013 How to use this guide Today s enterprises increasingly recognize that they need a technology solution to manage

More information

OFFICE OF EXTERNAL RELATIONS

OFFICE OF EXTERNAL RELATIONS OFFICE OF EXTERNAL RELATIONS Social Media Policy I. Purpose Social media encompass a wide variety of Internet networking and communication tools, including but not limited to sites such as Facebook and

More information

Governance Custodian to changing business trends and IT landscape

Governance Custodian to changing business trends and IT landscape Governance Custodian to changing business trends and IT landscape SURESH GP Trend on Governance Companies with effective IT Governance have profits that are 20 % higher than other companies pursuing similar

More information

5 Tips For Setting Measurable. Social Media Goals. 5 Tips for Measurable social media goals

5 Tips For Setting Measurable. Social Media Goals. 5 Tips for Measurable social media goals 5 Tips For Setting Measurable Social Media Goals 1 introduction Five practical tips for setting measurable social media goals Social media participation has become a must for businesses today. A survey

More information

Internship Guide. Get Started

Internship Guide. Get Started Internship Guide This guide provides a roadmap for any company, no matter the size of the business or the industry. Whether you re just getting started or already have an internship program that you want

More information

Social Media: Risks and Rewards

Social Media: Risks and Rewards Social Media: Risks and Rewards Nilesh (Neal) Patel Member Frost Brown Todd LLC 3300 Great American Tower Cincinnati, OH 45202 513.369.4805 npatel@fbtlaw.com Linkedin.com/in/nealpatel1/ 2013 Frost Brown

More information

13 Chapter Thirteen. Public Relations and. Sponsorship Programs. Copyright 2014 by Pearson Education 13-1

13 Chapter Thirteen. Public Relations and. Sponsorship Programs. Copyright 2014 by Pearson Education 13-1 13 Chapter Thirteen Public Relations and Sponsorship Programs 13-1 13 Volkswagen Generates PR to boost brand image Think Blue project for environmental sustainability Viral Fun Theory videos Sponsorship

More information

Cyber Security and the Board of Directors

Cyber Security and the Board of Directors Helping clients build operational capability in cyber security. A DELTA RISK VIEWPOINT Cyber Security and the Board of Directors An essential responsibility in financial services About Delta Risk is a

More information

Social Media: Privacy & Security

Social Media: Privacy & Security Social Media: Privacy & Security Brian Cummings Tata Consultancy Services Thursday, March 13, 2014 at 11:00 a.m. Session 14897 http://www.youtube.com/watch?v=qucffcchw1w Power of Social Networking Arab

More information

Barcelona Declaration of Measurement Principles Presented June 17, 2010 Revised June 20, 2010 Final July 19, 2010

Barcelona Declaration of Measurement Principles Presented June 17, 2010 Revised June 20, 2010 Final July 19, 2010 Barcelona Declaration of Measurement Principles Presented June 17, 2010 Revised June 20, 2010 Final July 19, 2010 Global Alliance ICCO Institute for Public Relations Public Relations Society of America

More information

High Value Audits: An Update on Information Technology Auditing. Robert B. Hirth Jr., Managing Director

High Value Audits: An Update on Information Technology Auditing. Robert B. Hirth Jr., Managing Director High Value Audits: An Update on Information Technology Auditing Robert B. Hirth Jr., Managing Director The technology landscape and its impact on internal audit Technology is playing an ever-growing role

More information

Impact of New Internal Control Frameworks

Impact of New Internal Control Frameworks Impact of New Internal Control Frameworks Webcast: Tuesday, February 25, 2014 CPE Credit: 1 0 With You Today Bob Jacobson Principal, Risk Advisory Services Consulting Leader West Region Bob.Jacobson@mcgladrey.com

More information

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011

More information

Applying Integrated Risk Management Scenarios for Improving Enterprise Governance

Applying Integrated Risk Management Scenarios for Improving Enterprise Governance Applying Integrated Risk Management Scenarios for Improving Enterprise Governance János Ivanyos Trusted Business Partners Ltd, Budapest, Hungary, ivanyos@trusted.hu Abstract: The term of scenario is used

More information

Security & Privacy Friends, Foes or Partners?

Security & Privacy Friends, Foes or Partners? Security & Privacy Friends, Foes or Partners? How To Develop a Global Privacy Compliance Strategy and Implementation Program Thursday, February 12 Rebecca Whitener, EDS Fellow (919) 645-1902 rebecca.whitener@eds.com

More information

SOCIAL MEDIA POLICY. Introduction

SOCIAL MEDIA POLICY. Introduction Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes

More information

CSR / Sustainability Governance and Management Assessment By Coro Strandberg Principal, Strandberg Consulting www.corostrandberg.

CSR / Sustainability Governance and Management Assessment By Coro Strandberg Principal, Strandberg Consulting www.corostrandberg. Introduction CSR / Sustainability Governance and Management Assessment By Coro Strandberg Principal, Strandberg Consulting www.corostrandberg.com June 2015 Companies which adopt CSR or sustainability 1

More information

www.pwc.com Third Party Risk Management 12 April 2012

www.pwc.com Third Party Risk Management 12 April 2012 www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.

More information

Guidelines for University Communications and Marketing Professionals

Guidelines for University Communications and Marketing Professionals Guidelines for University Communications and Marketing Professionals These guidelines were created by Penn State's Division of University Relations. For more information, contact Lisa M. Powers, director,

More information

Designing a Social Media Policy

Designing a Social Media Policy Designing a Social Media Policy Executive Summary Unlike broker/dealers, the social media content and communications of registered investment advisers or their investment advisory representatives through

More information

WHITE PAPER. 7 Keys to. successful. Organizational Change Management. Why Your CRM Program Needs Change Management and Tips for Getting Started

WHITE PAPER. 7 Keys to. successful. Organizational Change Management. Why Your CRM Program Needs Change Management and Tips for Getting Started 7 Keys to successful Organizational Change Management Why Your CRM Program Needs Change Management and Tips for Getting Started CONTENTS 2 Executive Summary 3 7 Keys to a Comprehensive Change Management

More information

Contents. Assessing Social Media Security. Chapter! The Social Media Security Process 3

Contents. Assessing Social Media Security. Chapter! The Social Media Security Process 3 Securing the Clicks: Network Security in the Age of Social Media Gary Bahadur Jason I nasi Alex de Carvalho Mc ssr New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan

More information

The Social Media and Communication Manager will implement the. Company s Social Media Strategy, develop brand awareness, generate

The Social Media and Communication Manager will implement the. Company s Social Media Strategy, develop brand awareness, generate SOCIAL MEDIA AND COMMUNICATION MANAGER Hours: Negotiable after interview Pay: Negotiable after interview The Social Media and Communication Manager will implement the Company s Social Media Strategy, develop

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

DISTRICT COUNCIL OF LOXTON WAIKERIE. Social Media Policy

DISTRICT COUNCIL OF LOXTON WAIKERIE. Social Media Policy DISTRICT COUNCIL OF LOXTON WAIKERIE Social Media Policy Policy Identification: Adoption Date: 20 April 2012 Last Review: 17 April 2015 Next Review Date: April 2017 Every 2 years Responsible Officer(s):

More information

A Sarbanes-Oxley Roadmap to Business Continuity

A Sarbanes-Oxley Roadmap to Business Continuity A Sarbanes-Oxley Roadmap to Business Continuity NEDRIX Conference June 23, 2004 Dr. Eric Schmidt eschmidt@controlsolutions.com Control Solutions International TECHNOLOGY ADVISORY, ASSURANCE & RISK MANAGEMENT

More information

Research Brief. Using the Model. Category One: Strategy

Research Brief. Using the Model. Category One: Strategy The Sirius Directions in Services Model The Sirius Directions in Services Model groups sales, marketing and product service providers and agencies into five categories: strategy, reputation, demand, sales

More information

Top Issues for Safeguarding Brand Reputation When Engaging In Social Media Activities

Top Issues for Safeguarding Brand Reputation When Engaging In Social Media Activities Top Issues for Safeguarding Brand Reputation When Engaging In Social Media By: Alan L. Friel, Akash Sachdeva, Jesse Brody and Jatinder Bahra Social media has changed the way people communicate, and enabled

More information

Talent Management Leadership in Professional Services Firms

Talent Management Leadership in Professional Services Firms Talent Management Leadership in Professional Services Firms Published by KENNEDY KENNEDY Consulting Research Consulting Research & Advisory & Advisory Sponsored by Table of Contents Introduction.... 3

More information

CONTACT CENTER 09: Five Steps to a Lean, Customer-Centric Service Organization

CONTACT CENTER 09: Five Steps to a Lean, Customer-Centric Service Organization CONTACT CENTER 09: Five Steps to a Lean, Customer-Centric Service Organization 2009 RightNow Technologies. All rights reserved. RightNow and RightNow logo are trademarks of RightNow Technologies Inc. All

More information

GROUP POLICY MANUAL CODE OF CONDUCT AND ETHICS POLICY

GROUP POLICY MANUAL CODE OF CONDUCT AND ETHICS POLICY POLICY NO: 8 (Group) Issued: November 2007 Revision No: 1 GROUP POLICY MANUAL CODE OF CONDUCT AND ETHICS POLICY Original Issued: 22 August, 2003 Effective: November 2007 Date Reviewed: February 2007 By:

More information

Copyright 2014 Nymity Inc. All Rights Reserved.

Copyright 2014 Nymity Inc. All Rights Reserved. This sample Benchmarks Report represents a real-world example of Your Privacy Management Status Report based on a mature privacy program in a non-north American organization within the public sector. Copyright

More information

The IBM data governance blueprint: Leveraging best practices and proven technologies

The IBM data governance blueprint: Leveraging best practices and proven technologies May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and

More information

County of Orange County Executive Office Information and Technology PURPOSE. County Social Media Use Policy and Procedure SOCIAL MEDIA USE

County of Orange County Executive Office Information and Technology PURPOSE. County Social Media Use Policy and Procedure SOCIAL MEDIA USE County of Orange County Executive Office Information and Technology PURPOSE SOCIAL MEDIA USE County Social Media Use Policy and Procedure Subject: Number: County Social Media Use Policy SM-001 Approved

More information

Becoming a Linux Foundation Collaborative Project Working Together to Help Projects Grow

Becoming a Linux Foundation Collaborative Project Working Together to Help Projects Grow Becoming a Linux Foundation Collaborative Project Working Together to Help Projects Grow Companies such as Google, IBM, Intel, the New York Stock Exchange, Qualcomm, HP, Samsung and others have relied

More information