Skip to content

Latest commit

 

History

History
66 lines (36 loc) · 4.21 KB

POL-016-social-media-policy.md

File metadata and controls

66 lines (36 loc) · 4.21 KB

POL-016 - Social Media Policy

Revision Revision Date Author Description of changes
v0.0.1 2017-07-06 Vladimir Ursu Initial Document
v0.0.2 2017-07-07 Eugene Istrati Approved

1. OVERVIEW

See pupose.

2. PURPOSE

The purpose of this This policy provides guidance for employee use of social media, which should be broadly understood for purposes of this policy to include blogs, wikis, microblogs, message boards, chat rooms, electronic newsletters, online forums, social networking sites, and other sites and services that permit users to share information with others in a contemporaneous manner.

3. SCOPE

4. POLICY

The following principles apply to professional use of social media on behalf of Mitoc Group (the "Company")" as well as personal use of social media when referencing the Company.

  • Employees need to know and adhere to the Company’s policies when using social media in reference to Company.

  • Employees should be aware of the effect their actions may have on their images, as well as Company’s image. The information that employees post or publish may be public information for a long time.

  • Employees should be aware that Company may observe content and information made available by employees through social media. Employees should use their best judgment in posting material that is neither inappropriate nor harmful to Company, its employees, or customers.

  • Although not an exclusive list, some specific examples of prohibited social media conduct include posting commentary, content, or images that are defamatory, pornographic, proprietary, harassing, libelous, or that can create a hostile work environment.

  • Employees are not to publish, post or release any information that is considered confidential or not public. If there are questions about what is considered confidential, employees should check with the Human Resources Department and/or supervisor.

  • Social media networks, blogs and other types of online content sometimes generate press and media attention or legal questions. Employees should refer these inquiries to authorized Company spokespersons.

  • If employees find encounter a situation while using social media that threatens to become antagonistic, employees should disengage from the dialogue in a polite manner and seek the advice of a supervisor.

  • Employees should get appropriate permission before you refer to or post images of current or former employees, members, vendors or suppliers. Additionally, employees should get appropriate permission to use a third party's copyrights, copyrighted material, trademarks, service marks or other intellectual property.

  • Social media use shouldn't interfere with employee’s responsibilities at Company. Company’s computer systems are to be used for business purposes only. When using Company’s computer systems, use of social media for business purposes is allowed (ex: Facebook, Twitter, Company blogs and LinkedIn), but personal use of social media networks or personal blogging of online content is discouraged and could result in disciplinary action.

  • Subject to applicable law, after‐hours online activity that violates Company’s policies may subject an employee to disciplinary action or termination.

  • If employees publish content after‐hours that involves work or subjects associated with Company, a disclaimer should be used, such as this: “The postings on this site are my own and may not represent Company’s positions, strategies or opinions.”

  • It is highly recommended that employees keep Company related social media accounts separate from personal accounts, if practical.

5. POLICY COMPLIANCE

5.1 Compliance Measurement

The Information Security Team will verify compliance to this policy through various methods, including but not limited to, periodic walk-thrus, video monitoring, business tool reports, internal and external audits, and feedback to the policy owner.

5.2 Exceptions

Any exception to the policy must be approved by the Information Security Team ([email protected]) in advance.

5.3 Non-Compliance

An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.