DIGITAL COMPETENCE DAY AT THE EU COMMISSION
             MARCH 26, 2013

       Internal social networks
         Risks&opportunities




                                        Jacques Folon
                                  Partner Edge Consulting
                              Me. de conf. Université de LIège
                                   Chargé de cours ICHEC
                               Prof. invitéUniversité de Metz
Cette présentation est sur
www.slideshare.net/folon

elle est à votre disposition
MY DIGITAL IDENTITY
http://jacquesfolon.tel
First part :Risks

1.   Data privacy
2.   Data security
3.   Intellectualproperty
4.   What about an
     internalcommunity
     manager?
1.0 Data privacy
1.1.Data privacy basics
• Basic principles: the Data
   controller
(i.e. the EU COMMISSION)
   – collect and processpersonal data
     onlywhenthisislegallypermitted
   – respect certain
     obligationsregarding the
     processing of personal data (details
     on nextslide) ;

   – respond to
     complaintsregardingbreaches of
     data protection rules;
   – collaboratewith national data
            Source: http://ec.europa.eu/justice/data-protection/index_en.htm
1.2. Data privacyrules for data
               controllers
• Personal Data must be
   – processed legally and fairly;
   – collected for explicit and legitimate
     purposes and used accordingly;
   – adequate, relevant and not excessive in
     relation to the purposes for which it is
     collected and/or further processed;
   – accurate, and updated where necessary;
   – kept any longer than strictly necessary;
   – rectified, removed or blocked by the
     data subject if incorrect;
   – Protected against accidental or unlawful
     destruction, loss, alteration and
     disclosure, particularly when processing
     involves data transmission over
     networks.

          Source: http://ec.europa.eu/justice/data-protection/index_en.htm
1.3. Data privacy&
    internal social media questions

•   Whichprecisepurpose ?
•   Whatkind of personal data willbestored?
•   Are data stored in Europe ?
•   Are they in the « Cloud »?
•   Data privacy commission adviceneeded?
•   Whatwillbe the securitypolicy?
•   What about the content of ex-employees?
•   Is a code of conductenough?

             SO IT ’S AN IMPORTANT ISSUE !!!
2.0. Data security




SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
Source : https://www.britestream.com/difference.html.
How many information?




                        67
Employees share (too) many information and
          also with third parties
Internal social networks
Internal social networks
Where do one steal     Which devices are
       data?                stolen?

•Banks                •USB
•Hospitals            •Laptops
•Ministries           •Hard disks
•Police               •Papers
•Newspapers           •Binders
•Telecoms             •Cars
•...
TELEWORKING
What are Control limitations?
3.0. INTELLECTUAL PROPERTY




  Source de l’image: http://www.maniacworld.com/copy-and-paste-babies.html
Copyright infringment




Source: http://en.wikipedia.org/wiki/File:Plagiarism_vs_Copyright_Infringement.png
Employer’sresponsibility !
• What about
  externalprotectedworks?
• What about creation by employees?
• What about import of
  protectedworks by employees?
• What about sub-
  contractorsprotectedworks?
• What about advertisingcampaign?
• What about pressclipping?
• What about externaltrademarks
• What about employee’s images?
• …

• What do youthink of a code of
  conduct?                   http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html
4.0. INTERNAL COMMUNITY MANAGER




PICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-role.html
Who’s in charge if …?




http://www.capreseaux.fr/community-management/
Second part: Added value




http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy
Internal social networks
Reading and answering e-mail. Approximately 28%, or about 11.2 hours,
of the average interaction worker’sworkweekisspentreading and
answering e-mails. The studyindicatesthatbecause of private social
media’sability to makesearchable content out of all posted messages, the
amount of time spentwith e-mail canbereduced by as much as 35%, or
about 4 hours.
Searching and gathering information. 19%, about 7.6 hours, of the
average interaction worker’sworkhours are spentsearching for internal
information only certain employeespossess. Again, because of enterprise
social media’sability to store all messages as searchable content, this
figure canbereduced by nearly 35% to about 4.9 hours per week,
whichamounts to a savings of 2.7 hours per week per interaction worker.
Communicating and collaboratinginternally. Using phones, e-mail, and
in-person interaction to communicate consumes about 5.6 hours of the
average interaction worker’sworkweek. Becauseyoucandirectly message
anyone in the organizationwithoutcluttering up an e-mail inboxwith a
collaboration tool, yourorganizationcanrealize up to a 35% time
savings, or about 2.0 hours per interaction worker.
Role-specifictasks. Tasksspecific to a particular job consume the
mostamount of time for anyrole, averaging out to about 15.6 hours per
week. Internal social media increases the productivity of thesetasks by
about 15%, or approximately 2.3 hours per week. One
waytheyenhancejob-specificproductivity lies in theirability to centralize al
job functionsat one hub, soyouremployeesbeginusing all other
applications there.
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
Source de l’image: http://agiledudes.com/wp-content/uploads/brain-transfer.jpg
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
Reed's Law
     The value of
   networks scales
  exponentially with
    the size of the
       network.

http://fr.slideshare.net/eekim/achieving-collective-intelligence
Brooks's Law
   Adding people
    to a complex
  project makes it
     take longer.


http://fr.slideshare.net/eekim/achieving-collective-intelligence
Network                                                       Network
     Potential                                                     Friction




http://fr.slideshare.net/eekim/achieving-collective-intelligence
We Want Reed to Win!




http://fr.slideshare.net/eekim/achieving-collective-intelligence
http://fr.slideshare.net/brainopera/seduction-of-the-swarm
Otheradded value
•   KM
•   Collective intelligence
•   Co-working
•   Network management

• BUT

• The vendorsalreadytoldyou, is ‘nt it?
Conclusion
•   Do not forgetprivacy issues
•   CC/CO 81
•   Control or not control
•   IPR regulation s/b reminded
•   Internal code of conduct
•   BUT
•   There are some important added value
Internal code of conduct main
                 rules
•   Define the internal and external social media
•   Intellectualpropertyrules
•   Data privacyexplanations
•   Confidential information
•   Anonimityisforbidden
•   Penalties
•   And
•   Which communication for the code of conduct?
•   How to have itapproved?
Internal social networks
Internal social networks
Any questions ?




Crédit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/
                                                                                         45
Internal social networks

More Related Content

PPTX
Internal social media: risks and added value
PPT
Wipo smes ge_08_topic07
PPTX
Internet Ethics Issues and Action in the United States
PDF
Knowledge management for professionals
PPT
Computer Ethics
PDF
Ethical and Social Issues in ICT
PPTX
Social and professional issuesin it
PPTX
Social & professional issues in IT
Internal social media: risks and added value
Wipo smes ge_08_topic07
Internet Ethics Issues and Action in the United States
Knowledge management for professionals
Computer Ethics
Ethical and Social Issues in ICT
Social and professional issuesin it
Social & professional issues in IT

What's hot (20)

PPTX
computer and society impact of Computer in society
PPTX
Social Networking (Ethics in Information Technology)
PPTX
Shannon Morris PDLM presentation
PPT
Ethical Issues In ICT
PPTX
Project in Empowerment Technology
PPTX
Governance & Ediscovery
PPTX
Introduction to ICT (Web 1.0 and Web 2.0)
PPTX
Ethics and privacy ppt 3rd period
PPT
ICT and Citizenship
PPTX
Managing social software applications in the corporate and public sector envi...
PDF
Globalcompose.com sample essay paper on cyber ethics
PPTX
Ethics in Cyber Space
PPTX
20160317 ARMA Wyoming Social Media Security Threats
PPTX
Empowerment technology
PDF
Internet of things (IoT)
PPTX
Chapter 3
PPTX
Cyber ethics
DOCX
Cyber ethics
PPTX
اخلاقيات الثالث
PDF
Cyberspace and cyberethics and social networking
computer and society impact of Computer in society
Social Networking (Ethics in Information Technology)
Shannon Morris PDLM presentation
Ethical Issues In ICT
Project in Empowerment Technology
Governance & Ediscovery
Introduction to ICT (Web 1.0 and Web 2.0)
Ethics and privacy ppt 3rd period
ICT and Citizenship
Managing social software applications in the corporate and public sector envi...
Globalcompose.com sample essay paper on cyber ethics
Ethics in Cyber Space
20160317 ARMA Wyoming Social Media Security Threats
Empowerment technology
Internet of things (IoT)
Chapter 3
Cyber ethics
Cyber ethics
اخلاقيات الثالث
Cyberspace and cyberethics and social networking
Ad

Viewers also liked (20)

PDF
Comment paramétrer vos messages sur le module Prestashop de SMS Partner ?
PPT
Color digital C Franco
PPTX
Diccionario pictórico
PPT
Curso trabajar en red en asociaciones
PPT
Visión del Docente sobre el Uso del Blog en el Aula
PDF
L'innovazione sociale secondo Roberto Covolo (Ex Fadda)
PDF
Oscar Corbelli. Tecnofor. Los 5 mayores destructores de valor en TI. Semanain...
DOCX
Modelos requisitos casos de uso si_investigación
PDF
Gastro altas 1
DOCX
Life forching. un nuevo comienzo
PDF
Ellas hacen sedes pre inscripcion
PPT
16 mamiferos
PDF
Gauranga Das - Védikus Asztrológia A Gyakorlatban - pdf letöltés, 273p
DOCX
Cv carolina prieto 2015 terminado (1)
PDF
Europe biosimilars market opportunity outlook 2020
PPTX
Origins of World War I
PPTX
Drug release and dissolution
PPT
Mecanismos de transmision 1eso
PDF
Guia creda els alumnes sords a ei i ci curs 11 12
PPT
Trampas de la Cartografía Convencional
Comment paramétrer vos messages sur le module Prestashop de SMS Partner ?
Color digital C Franco
Diccionario pictórico
Curso trabajar en red en asociaciones
Visión del Docente sobre el Uso del Blog en el Aula
L'innovazione sociale secondo Roberto Covolo (Ex Fadda)
Oscar Corbelli. Tecnofor. Los 5 mayores destructores de valor en TI. Semanain...
Modelos requisitos casos de uso si_investigación
Gastro altas 1
Life forching. un nuevo comienzo
Ellas hacen sedes pre inscripcion
16 mamiferos
Gauranga Das - Védikus Asztrológia A Gyakorlatban - pdf letöltés, 273p
Cv carolina prieto 2015 terminado (1)
Europe biosimilars market opportunity outlook 2020
Origins of World War I
Drug release and dissolution
Mecanismos de transmision 1eso
Guia creda els alumnes sords a ei i ci curs 11 12
Trampas de la Cartografía Convencional
Ad

Similar to Internal social networks (20)

PPT
Réseaux sociaux d'entreprise
PPTX
Social Media & Social Networking: A Cautionary Tale
PDF
Social Media London Presentation 5th April 2011
PDF
Sup de Co Rennes - planning 2014-2015
PPT
Data privacy & social media
PDF
Social Business: The Irresistible Force To Overcome Immovable Objections
PPT
Social collaboration 10 must have tips for security, productivity and compliance
PDF
Workplace strategies for protecting confidential and proprietary property
PDF
Challenges and Opportunities for Mainstream Enterprise Social Computing
KEY
Social media: Legal and business challenges
PPT
How Law Firms Build Trust for Your Business Online (Social Media Policy)
KEY
Toast Social Media 20090804
PPT
Discovering The Value Of Social Networks and Communities of Practice
PDF
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
PDF
How to Implement Workplace Monitoring & Preserve Employee Autonomy
PPTX
Real World Tips & Tricks For Enterprise Social Collaboration
PPTX
In-house counsel Masterclass: Navigating the Social Network
PPT
Harnessing the benefits of online communities of practice (CoPs)
PDF
Using Social Media to Empower Employees: Confernce Board Workshop
PDF
Leveraging social media across the organization
Réseaux sociaux d'entreprise
Social Media & Social Networking: A Cautionary Tale
Social Media London Presentation 5th April 2011
Sup de Co Rennes - planning 2014-2015
Data privacy & social media
Social Business: The Irresistible Force To Overcome Immovable Objections
Social collaboration 10 must have tips for security, productivity and compliance
Workplace strategies for protecting confidential and proprietary property
Challenges and Opportunities for Mainstream Enterprise Social Computing
Social media: Legal and business challenges
How Law Firms Build Trust for Your Business Online (Social Media Policy)
Toast Social Media 20090804
Discovering The Value Of Social Networks and Communities of Practice
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
How to Implement Workplace Monitoring & Preserve Employee Autonomy
Real World Tips & Tricks For Enterprise Social Collaboration
In-house counsel Masterclass: Navigating the Social Network
Harnessing the benefits of online communities of practice (CoPs)
Using Social Media to Empower Employees: Confernce Board Workshop
Leveraging social media across the organization

More from Prof. Jacques Folon (Ph.D) (20)

PPTX
Introduction to digital strategy
PPTX
PPTX
Cpas divers sujets
PPTX
Ferrer premier cours octobre 2021
PPTX
premier cours saint louis sept 2021
PPTX
Cmd premier cours sept 2021
PPTX
CPAS ET RGPD : direction et DPO
PPTX
le RGPD fossoyeur du marketing digital ?
PPTX
Ifc gdpr strat digit mai 2021
PPTX
Pandemie et vie privee
PPTX
GDPR & digital strategy
PPTX
Cmd de la stratégie au marketing digital
PPTX
Ichec ipr feb 2021
PPTX
Strategy for digital business class #1
PPTX
PPTX
Cmd premier cours
PPTX
PPTX
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
PPTX
RGPD et stratégie digitale
Introduction to digital strategy
Cpas divers sujets
Ferrer premier cours octobre 2021
premier cours saint louis sept 2021
Cmd premier cours sept 2021
CPAS ET RGPD : direction et DPO
le RGPD fossoyeur du marketing digital ?
Ifc gdpr strat digit mai 2021
Pandemie et vie privee
GDPR & digital strategy
Cmd de la stratégie au marketing digital
Ichec ipr feb 2021
Strategy for digital business class #1
Cmd premier cours
Rh et data DANS LE MONDE APRÈS LE CONFINEMENT
RGPD et stratégie digitale

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPT
What is a Computer? Input Devices /output devices
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Tartificialntelligence_presentation.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Architecture types and enterprise applications.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Five Habits of High-Impact Board Members
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Getting Started with Data Integration: FME Form 101
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
O2C Customer Invoices to Receipt V15A.pptx
What is a Computer? Input Devices /output devices
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Enhancing emotion recognition model for a student engagement use case through...
Tartificialntelligence_presentation.pptx
DP Operators-handbook-extract for the Mautical Institute
A comparative study of natural language inference in Swahili using monolingua...
Univ-Connecticut-ChatGPT-Presentaion.pdf
CloudStack 4.21: First Look Webinar slides
WOOl fibre morphology and structure.pdf for textiles
Hindi spoken digit analysis for native and non-native speakers
Architecture types and enterprise applications.pdf
Chapter 5: Probability Theory and Statistics
Five Habits of High-Impact Board Members
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

Internal social networks

  • 1. DIGITAL COMPETENCE DAY AT THE EU COMMISSION MARCH 26, 2013 Internal social networks Risks&opportunities Jacques Folon Partner Edge Consulting Me. de conf. Université de LIège Chargé de cours ICHEC Prof. invitéUniversité de Metz
  • 2. Cette présentation est sur www.slideshare.net/folon elle est à votre disposition
  • 4. First part :Risks 1. Data privacy 2. Data security 3. Intellectualproperty 4. What about an internalcommunity manager?
  • 6. 1.1.Data privacy basics • Basic principles: the Data controller (i.e. the EU COMMISSION) – collect and processpersonal data onlywhenthisislegallypermitted – respect certain obligationsregarding the processing of personal data (details on nextslide) ; – respond to complaintsregardingbreaches of data protection rules; – collaboratewith national data Source: http://ec.europa.eu/justice/data-protection/index_en.htm
  • 7. 1.2. Data privacyrules for data controllers • Personal Data must be – processed legally and fairly; – collected for explicit and legitimate purposes and used accordingly; – adequate, relevant and not excessive in relation to the purposes for which it is collected and/or further processed; – accurate, and updated where necessary; – kept any longer than strictly necessary; – rectified, removed or blocked by the data subject if incorrect; – Protected against accidental or unlawful destruction, loss, alteration and disclosure, particularly when processing involves data transmission over networks. Source: http://ec.europa.eu/justice/data-protection/index_en.htm
  • 8. 1.3. Data privacy& internal social media questions • Whichprecisepurpose ? • Whatkind of personal data willbestored? • Are data stored in Europe ? • Are they in the « Cloud »? • Data privacy commission adviceneeded? • Whatwillbe the securitypolicy? • What about the content of ex-employees? • Is a code of conductenough? SO IT ’S AN IMPORTANT ISSUE !!!
  • 9. 2.0. Data security SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
  • 12. Employees share (too) many information and also with third parties
  • 15. Where do one steal Which devices are data? stolen? •Banks •USB •Hospitals •Laptops •Ministries •Hard disks •Police •Papers •Newspapers •Binders •Telecoms •Cars •...
  • 17. What are Control limitations?
  • 18. 3.0. INTELLECTUAL PROPERTY Source de l’image: http://www.maniacworld.com/copy-and-paste-babies.html
  • 20. Employer’sresponsibility ! • What about externalprotectedworks? • What about creation by employees? • What about import of protectedworks by employees? • What about sub- contractorsprotectedworks? • What about advertisingcampaign? • What about pressclipping? • What about externaltrademarks • What about employee’s images? • … • What do youthink of a code of conduct? http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html
  • 21. 4.0. INTERNAL COMMUNITY MANAGER PICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-role.html
  • 22. Who’s in charge if …? http://www.capreseaux.fr/community-management/
  • 23. Second part: Added value http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy
  • 25. Reading and answering e-mail. Approximately 28%, or about 11.2 hours, of the average interaction worker’sworkweekisspentreading and answering e-mails. The studyindicatesthatbecause of private social media’sability to makesearchable content out of all posted messages, the amount of time spentwith e-mail canbereduced by as much as 35%, or about 4 hours.
  • 26. Searching and gathering information. 19%, about 7.6 hours, of the average interaction worker’sworkhours are spentsearching for internal information only certain employeespossess. Again, because of enterprise social media’sability to store all messages as searchable content, this figure canbereduced by nearly 35% to about 4.9 hours per week, whichamounts to a savings of 2.7 hours per week per interaction worker.
  • 27. Communicating and collaboratinginternally. Using phones, e-mail, and in-person interaction to communicate consumes about 5.6 hours of the average interaction worker’sworkweek. Becauseyoucandirectly message anyone in the organizationwithoutcluttering up an e-mail inboxwith a collaboration tool, yourorganizationcanrealize up to a 35% time savings, or about 2.0 hours per interaction worker.
  • 28. Role-specifictasks. Tasksspecific to a particular job consume the mostamount of time for anyrole, averaging out to about 15.6 hours per week. Internal social media increases the productivity of thesetasks by about 15%, or approximately 2.3 hours per week. One waytheyenhancejob-specificproductivity lies in theirability to centralize al job functionsat one hub, soyouremployeesbeginusing all other applications there.
  • 31. Source de l’image: http://agiledudes.com/wp-content/uploads/brain-transfer.jpg
  • 35. Reed's Law The value of networks scales exponentially with the size of the network. http://fr.slideshare.net/eekim/achieving-collective-intelligence
  • 36. Brooks's Law Adding people to a complex project makes it take longer. http://fr.slideshare.net/eekim/achieving-collective-intelligence
  • 37. Network Network Potential Friction http://fr.slideshare.net/eekim/achieving-collective-intelligence
  • 38. We Want Reed to Win! http://fr.slideshare.net/eekim/achieving-collective-intelligence
  • 40. Otheradded value • KM • Collective intelligence • Co-working • Network management • BUT • The vendorsalreadytoldyou, is ‘nt it?
  • 41. Conclusion • Do not forgetprivacy issues • CC/CO 81 • Control or not control • IPR regulation s/b reminded • Internal code of conduct • BUT • There are some important added value
  • 42. Internal code of conduct main rules • Define the internal and external social media • Intellectualpropertyrules • Data privacyexplanations • Confidential information • Anonimityisforbidden • Penalties • And • Which communication for the code of conduct? • How to have itapproved?
  • 45. Any questions ? Crédit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/ 45