policy brief social media
TRANSCRIPT
-
8/3/2019 Policy Brief Social Media
1/3
Policy Brief: Social Media, Security and Privacy
Preparing Extension for Social Media and Creating a Cyber Safe Environment
Executive Summary
Our organization uses social media to achieve our mission. Professors use it to communicate with their
classes and to engage in open discussions, extension educators use it to contact stakeholders and announce
upcoming events and to report recent happenings, staff uses it to share resources in content area.
Social media is not going away. Three fourths of all 7th
-12th
graders have at least one social media profile.
(Read more at the Kaiser Foundation:http://www.kff.org/entmedia/entmedia012010nr.cfm )
We know that social media uses technology for the digital exchange of ideas and for interactions. A quickpoll of coworkers identified numerous forms of social media that are currently used: Facebook, Twitter,
YouTube, Blogger, Word Press, Foursquare, various Google products like Google.docs, Dropbox, LinkedIn,
PBWorks, Delicious, Diigo, Ning, and Plone, to name just a few of the sites from that small unscientific
sample.
To deny the usefulness of social media would equate to the naysayers speaking out against Alexander
Graham Bell when he invented the telephone. Instead of fighting the realities, we must proactively move toguide its use as a tool for the exchange of ideas.
In the article,National Cyber Security Alliance Announces New Agreement with the U.S. Department of
Education, NIST and National Cybersecurity Education Council to Promote Formal Cyber Security
Education Programs Nationwide. Wall Street Journal/Market Watch:http://tinyurl.com/3sn5zrn
Our children live in an interconnected technology-based world with a growing need for digital skill sets,"
said U.S. Secretary of Education Arne Duncan.
"Our future depends on a digital citizenry that can use the Internet safely, securely, ethically and
productively," said Michael Kaiser, executive director of the National Cyber Security Alliance.
Not only do experts in the field realize the need for youth using technology, they show that the development
of skills in the area is important. Another expert supports that fact and expands it to address the need forsecurity and safety.
Context and Importance of the Problem (Critique of existing policy)
Social media has opened doors of communication for our society and for our workplace. We must work tobecome stewards however, of what enters and what leaves through the door in relation to our organization.
There are general overriding policies in place to deal with the umbrella issues. Just as social media has
evolved, so too must our guidelines for protecting our stakeholders and our organization.
Because we work with youth, 4-H has developed both process and policy to ensure the safety of minorchildren. To hire staff, the University conducts a screening process to check the background of anyone
working with children. Because we are a youth serving organization that relies upon the services of a
volunteer workforce, we have an intense screening process (http://extension.psu.edu/4-h/leaders/factsheets/FactSheet5.pdf/at_download/file ) that includes checking references, state police and
Childline background checks and, and an interview process of anyone applying to volunteer with our
organization. We also conduct training for new volunteers to specifically address the policy on ReportingChild Abuse and Neglect (http://extension.psu.edu/4-h/leaders/factsheets/FactSheet9.pdf/at_download/file )
http://www.kff.org/entmedia/entmedia012010nr.cfmhttp://www.kff.org/entmedia/entmedia012010nr.cfmhttp://www.kff.org/entmedia/entmedia012010nr.cfmhttp://tinyurl.com/3sn5zrnhttp://tinyurl.com/3sn5zrnhttp://tinyurl.com/3sn5zrnhttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet5.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet5.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet5.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet5.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet9.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet9.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet9.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet9.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet5.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet5.pdf/at_download/filehttp://tinyurl.com/3sn5zrnhttp://www.kff.org/entmedia/entmedia012010nr.cfm -
8/3/2019 Policy Brief Social Media
2/3
in order to deal with actions that must take place should they sense that a child has been a victim of abuse orneglect.
Because of the focus on the adult (volunteer and staff) and child relationships, and the importance of
protecting our youth, these protections need to be expanded to address the growth of social media and the useof technology for interactions with our youth.
Internet security and privacy is another important concern for any organization. Penn State has numerous
policies and guides in place to address cyber-security issues (http://its.psu.edu/be-safe ) in relation to our
workplace. As I reviewed several of the policies and guides, I quickly realized whether many of my peersare really aware of the measures of protection we are required to take, and why they are in place. The issue
in this case is not whether there is guiding policy, rather it is an issue of knowledge (or lack thereof), and
understanding the need to secure. This deficiency has to be addressed.
Policy Recommendation I: Develop a policy that outlines appropriate digital communications and
interactions with adult staff and volunteers with minor children for the protection of all parties. Standards
should include setting expectations for interactions to take place in public forums that can always be viewedby others. An example of this would be a public group on Facebook, or a community discussion forum.
Pro
Can help protect adult and volunteer staff from false accusations It will give adults an excuse to tell minors that they are not permitted to engage in private
interactions
Prevent minors from seeing age-appropriate adult behaviors that may not be a good example forminor youth
Con
First amendment right issues in regards to adult volunteer interactions with minors have to beconsidered. (http://www.huffingtonpost.com/2011/10/21/missouri-repeals-law-rest_n_1025761.html )
Policy Recommendation II Establish core competencies for employees of the organization and create a
process that new employees must learn and implement the necessary preventative steps to protect the
University, the networks, and equipment from outside entities when using the Internet, World Wide Web,and social networking sites.
In Social Media and Privacy: Best Practices for Managing Your Personal and Professional Identities,Andrew Heller from NTEN (Nonprofit Technology Network) outlines steps that can be taken for managing
identities, including:
Knowing the risks Privacy settings for sites like Facebook, Twitter, LinkedIn Develop a Social Media Guideline for Your organization
(For the complete article:http://tinyurl.com/2ehmtvd)
Pro Security measures are already identified and listed in Information Technologies site Standard level of expectation to all employees and can be tracked and reviewed for performance
evaluation
Educators will be able develop educational program for their stakeholders with their knowledgeCon
Tracking and managing orientation and tracking Updating security strategies in a timely fashion then refreshing employees to new measures
http://its.psu.edu/be-safehttp://its.psu.edu/be-safehttp://its.psu.edu/be-safehttp://www.huffingtonpost.com/2011/10/21/missouri-repeals-law-rest_n_1025761.htmlhttp://www.huffingtonpost.com/2011/10/21/missouri-repeals-law-rest_n_1025761.htmlhttp://www.huffingtonpost.com/2011/10/21/missouri-repeals-law-rest_n_1025761.htmlhttp://tinyurl.com/2ehmtvdhttp://tinyurl.com/2ehmtvdhttp://tinyurl.com/2ehmtvdhttp://tinyurl.com/2ehmtvdhttp://www.huffingtonpost.com/2011/10/21/missouri-repeals-law-rest_n_1025761.htmlhttp://its.psu.edu/be-safe -
8/3/2019 Policy Brief Social Media
3/3
Tracking changes of web and social networking sites in terms of their security changes and changesin their Terms of Service (TOS) as it relates to how information is collected and used
Sources consulted
http://www.onlineuniversities.com/blog/2011/09/using-social-media-in-the-higher-education-classroom/
http://www.nten.org/blog/2010/04/28/social-media-and-privacy-best-practices-managing-your-personal-and-
professional-identities
http://www.marketwatch.com/story/national-cyber-security-alliance-announces-new-agreement-with-the-us-
department-of-education-nist-and-national-cybersecurity-education-council-to-promote-formal-cyber-
security-education-programs-2011-10-28
http://www.crn.com/news/security/231602450/study-organizations-waking-up-to-social-media-security-
risks.htm;jsessionid=ETPzMLXJbJGknkoAsXiarQ**.ecappj01
http://its.psu.edu/be-safe
http://www.huffingtonpost.com/2011/10/21/missouri-repeals-law-rest_n_1025761.html
http://extension.psu.edu/4-h/leaders/factsheets/
http://www.onlineuniversities.com/blog/2011/09/using-social-media-in-the-higher-education-classroom/http://www.onlineuniversities.com/blog/2011/09/using-social-media-in-the-higher-education-classroom/http://www.nten.org/blog/2010/04/28/social-media-and-privacy-best-practices-managing-your-personal-and-professional-identitieshttp://www.nten.org/blog/2010/04/28/social-media-and-privacy-best-practices-managing-your-personal-and-professional-identitieshttp://www.nten.org/blog/2010/04/28/social-media-and-privacy-best-practices-managing-your-personal-and-professional-identitieshttp://www.marketwatch.com/story/national-cyber-security-alliance-announces-new-agreement-with-the-us-department-of-education-nist-and-national-cybersecurity-education-council-to-promote-formal-cyber-security-education-programs-2011-10-28http://www.marketwatch.com/story/national-cyber-security-alliance-announces-new-agreement-with-the-us-department-of-education-nist-and-national-cybersecurity-education-council-to-promote-formal-cyber-security-education-programs-2011-10-28http://www.marketwatch.com/story/national-cyber-security-alliance-announces-new-agreement-with-the-us-department-of-education-nist-and-national-cybersecurity-education-council-to-promote-formal-cyber-security-education-programs-2011-10-28http://www.marketwatch.com/story/national-cyber-security-alliance-announces-new-agreement-with-the-us-department-of-education-nist-and-national-cybersecurity-education-council-to-promote-formal-cyber-security-education-programs-2011-10-28http://www.crn.com/news/security/231602450/study-organizations-waking-up-to-social-media-security-risks.htm;jsessionid=ETPzMLXJbJGknkoAsXiarQ**.ecappj01http://www.crn.com/news/security/231602450/study-organizations-waking-up-to-social-media-security-risks.htm;jsessionid=ETPzMLXJbJGknkoAsXiarQ**.ecappj01http://www.crn.com/news/security/231602450/study-organizations-waking-up-to-social-media-security-risks.htm;jsessionid=ETPzMLXJbJGknkoAsXiarQ**.ecappj01http://its.psu.edu/be-safehttp://its.psu.edu/be-safehttp://www.huffingtonpost.com/2011/10/21/missouri-repeals-law-rest_n_1025761.htmlhttp://www.huffingtonpost.com/2011/10/21/missouri-repeals-law-rest_n_1025761.htmlhttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet5.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet5.pdf/at_download/filehttp://extension.psu.edu/4-h/leaders/factsheets/FactSheet5.pdf/at_download/filehttp://www.huffingtonpost.com/2011/10/21/missouri-repeals-law-rest_n_1025761.htmlhttp://its.psu.edu/be-safehttp://www.crn.com/news/security/231602450/study-organizations-waking-up-to-social-media-security-risks.htm;jsessionid=ETPzMLXJbJGknkoAsXiarQ**.ecappj01http://www.crn.com/news/security/231602450/study-organizations-waking-up-to-social-media-security-risks.htm;jsessionid=ETPzMLXJbJGknkoAsXiarQ**.ecappj01http://www.marketwatch.com/story/national-cyber-security-alliance-announces-new-agreement-with-the-us-department-of-education-nist-and-national-cybersecurity-education-council-to-promote-formal-cyber-security-education-programs-2011-10-28http://www.marketwatch.com/story/national-cyber-security-alliance-announces-new-agreement-with-the-us-department-of-education-nist-and-national-cybersecurity-education-council-to-promote-formal-cyber-security-education-programs-2011-10-28http://www.marketwatch.com/story/national-cyber-security-alliance-announces-new-agreement-with-the-us-department-of-education-nist-and-national-cybersecurity-education-council-to-promote-formal-cyber-security-education-programs-2011-10-28http://www.nten.org/blog/2010/04/28/social-media-and-privacy-best-practices-managing-your-personal-and-professional-identitieshttp://www.nten.org/blog/2010/04/28/social-media-and-privacy-best-practices-managing-your-personal-and-professional-identitieshttp://www.onlineuniversities.com/blog/2011/09/using-social-media-in-the-higher-education-classroom/