In our personal lives, we talk about things like security and privacy all the time. Last week’s uproar on Facebook is only the latest example.
But most large enterprises seem to be missing the boat … by a nautical mile.
According to the Altimeter Group, “almost two-thirds of companies … say that social media is a significant or critical risk to their brand reputation.”
And Forrester Research tells us that 64% of large companies “have no social media policy in place, or if they do, they lack tools to sufficiently enforce and support the policy.”
Why is this?
In the rush for engagement, conversation and reach, critical issues that protect the integrity of the brand like security, risk and compliance can get left by the wayside.
Sprinklr works with some of the world’s largest, most social brands. Companies such as Dell, Samsung, Cisco, Hearst and Virgin America — among 100 others.
Based on our experience, we’ve assembled a list of the 22 Must Haves for a Secure Enterprise Social Media Deployment.
We’ve discovered that secure social media presences tend to have these 10 governance elements in common:
- Rules to flag unacceptable content
- A process for approving content
- Involvement from the legal team in setting down content guidelines
- An established procedure for handling escalation
- The means to track incidents until they’re resolved
- A procedure for handling any “rogue” social media accounts
- Single-point password control that goes across the entire enterprise
- Rules that limit the sharing of passwords
- Standards for managing access
- A set of social media guidelines
You can see the full list of 22 elements of secure enterprise social media deployment here, including security and compliance guidelines.
Feel free to let us know if you have questions or comments at www.sprinklr.com or @sprinklr.
This post is by Jeremy Epstein, vice president of marketing at Sprinklr.