The following list will provide for an outline for social media policy as well as social media network creation and implementation. Although not an exhaustive list, it can serve as a solid base to build upon.
• Ensure a proper firewall is installed- A firewall serves as a barrier for organizations to protect themselves from malicious activity. This is especially crucial if an organization deals with confidential information. This also protects consumers from having their personal information exposed. For larger institutions this would be handled by a designated IT department.
• Edit personal information on social media sites to limit exposure- As it was detailed in the module for social networking that we have reviewed, it is important to limit the amount of personal information displayed online. Things like year of birth, and hometown can leave you vulnerable to predatory activity because they are “crucial data to identifying people” (Lohr).
• Think critically about what information is being posted- Posting things like “check-ins” can assist malicious individuals in tracking your movement. This is dangerous because it allows them to know when your home is potentially vulnerable for break in. To prevent exposing yourself in this way, ensure that your privacy settings are correct and limit “check-ins” that could establish a pattern for your movement.
• Only accept friend requests from known associates and acquaintances- Accepting friend requests from everyone that solicits you is tantamount to providing personal information to anyone you see on the street. It is not wise to allow others that you do not know to access your personal information in this way. You can prevent strangers from requesting your friendship by updating your security settings.
• Ensure employees are well versed in setting security features on their social media profiles- As was evident from both our readings and from personal experience, security settings change far too often for people not to know how to monitor and change them. Training should be provided to ensure employees understand the procedure to change these settings as well as what an appropriate setting should be.
• Provide a detailed and specific employee social media policy- This information should be disseminated to employees to ensure that they are fully aware of what is expected of them when referring to social media. This should be distributed as part of the initial training and hiring process.
• Educate employees regarding the danger of social media- Employees should be well versed on how to interact on social media without causing harm to themselves or to their place of employment. Training individuals can prevent the potential release of confidential information. Even without malicious intent, the release of confidential information by an employee can not only mean termination for them, but legal issues for the organization as well.
Through the various readings from this week I have come to the realization that even when using caution, it is easy to post too much information on social media, potentially exposing you to phishing, or fraud. Understanding what is appropriate to post on social media and what is not can make the difference between keeping your job and possibly losing it. The most concerning element of this week’s reading is that it really only takes the smallest amount of information to potentially steal someone’s identity. That was particularly obvious in the New York Times article by Steve Lohr (link below) when scientists at Stanford University proved “that they could identify more than 30 percent of the users of both Twitter, the microblogging service, and Flickr, an online photo-sharing service, even though the accounts had been stripped of identifying information like account names and e-mail addresses”.
How Privacy Vanishes Online
Even the smallest amount of information could lead to identity theft, and unfortunately one can never be too careful.



