Monday, June 10, 2019
Social Media Individual Assignment Essay Example | Topics and Well Written Essays - 500 words - 1
Social Media Individual Assignment - Essay ExampleThese regulations could also be functional to social networks. The following are a list of guidelines firms can use to check social network usage in the office. 1) Competence dismiss employees that they must not put on any social media instrument unless they actually dig up how it operates. 2) Purpose remind workers that corporation communications and information system technology are created and purposed for work, not for item-by-item use (Bennett 1-2). 3) Integrity remind workers that the corporation expects moral and honest behavior from its entire staff, at all sequences. 4) Appropriate Content remind workers that any digital communications and social media activities for job-associated purposes must uphold and reflect on the communitys values for professionalism. 5) Confidential Information state clearly those employees must conform to all company rules covering secret information and business secrets (Bennett 1-2). 6) Link s reprove employees not to give links to the firms internal or external websites from their individual social networking pages. 7) Endorsements notify workers that posting statements concerning the companys products and services may be regarded promotion and should be authorized by firms officials. 8) Time company must restrict time employees use social media network so as not to interfere with their work (Bennett 1-2).Social computing sites are a threat to security. Phishing and malware are excise worries in the customer space, and their threat handled in the corporate space (Ghandi 1-2). Corporate social media are ideal entry points for these risks. Social media make it easier for individuals to form links, comprehend relationships and influence connections in the company (Ghandi 1-2).Yes, social media network can tarnish a firms reputation. Web 2.0 offers tools and chances for employees to disclose sensitive data easily, whether on purpose or not they pose risks to security. Th ese risks
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.