Tracking Social Media for Possible Confidentiality Violations

Tony Karrer

I personally don't think this is different than email or IM. Found via FastFoward blog - Attention Business Bloggers: Big Brother is Watching - Techrigy is a new start-up that focuses on: Real-time social media management for enterprises with SM2. As blogs and wikis spread throughout enterprises, organizations must deal with compliance and risk-management issues that are created from communications through these media.

Cammy Beans Learning Visions: Blogging & Boundaries in the Professional Sphere

Learning Visions

Thursday, March 29, 2007 Blogging & Boundaries in the Professional Sphere Karyn Romeis recent post echoed stuff thats been rolling around in my mind about blogging, professionalism, sharing, confidentiality, roles, boundaries, etc. To work out my thoughts and ideas (hey, Im an extrovert -- I need to talk about whats going on in my head in order to process it and take it to the next level). Im a new blogger -- not fully evolved). At least, I would hope thats what Im doing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

What Your Onboarding Kit Should Include (And Why You Should Offer One)

TalentLMS

Confidentiality agreements. So, make sure to include this information in your onboarding kit for new employees: A directory of employee profiles including names, contact details, and usernames on company messaging applications like Slack or IM. It’s Day 1 at your new job. As you walk through the sliding door and towards the front desk to let them know you’ve arrived, you can’t keep the smile off your face. This is exactly the career opportunity you’ve been waiting for.

Student-to-student interaction in small distance courses

E-Learning Acupuncture

Of course, the graded piece at the end conducted by the instructor should be kept confidential and not be placed into the discussion forum. This requires students to create a document that contains all their contact information (including skype/twitter/facebook/IMs/TextMsgs), their expectations for the project, their personal strengths, weaknesses and interests.

Cammy Beans Learning Visions: Second Life Backlash and Controversy

Learning Visions

And Im not implying that Im a Second Life naysayer. Confidentiality 4. Ive been exploring the use of Second Life for a client for whom Im developing an e-Learning strategy. Theirs is an audience comprised only of women and Im not convinced Second Life will feel appropriate to them. Cammy Beans Learning Visions Musings on eLearning, instructional design and other training stuff.

Web 2.0 Applications in Learning

Tony Karrer

I tried to capture things down as they were said, here are my notes: Firewalls IP Privacy / Confidentiality Security Control over Quality of Information Strict Control Over Policies – Accuracy Liability / Discoverability / Compliance Change Management – Ready for It / Culture Management Take it Seriously – Away from Work Education of Management Lack of Resources – Mobile Devices Push Back from Workforce - Adoption This is a pretty good list of commonly cited barriers.

Web 103