What are your employees saying on Facebook? Here's four steps enterprises can take to contain the legal risks associated with employees using social networking tools such as Facebook and Twitter Twitter, Facebook, LinkedIn and other social networking sites practically beg you to reveal even more information about yourself. Log on and you’re asked: What are you doing? What are you doing right now? What are you working on? More on CIO.com How Text Messaging and Facebook Can Get You in Legal Trouble The Thing That Will Make Facebook Important to the Enterprise: More Business Widgets Adoption of Corporate Social Networks Remains Sluggish Whether they mean to or not, any of your employees active on these sites can give away company secrets as easily as they do personal ones, 150-odd characters at a time. For CIOs trying to get a grip on social networking by employees, Tom Mighell, a lawyer and senior manager at Fios, an electronic-discovery consulting firm, offers some starting points: 1. Accept and train. Many employees will use social networking tools regardless of what you want them to do. Instead of trying to stop them, teach them what to say, or what not to say, about work. For example, employees might be tempted to promote the features of a new product. But should that product become the subject of a product liability claim, those statements could be used as damning evidence, Mighell says. Also, they should be clear about which statements are opinion, which are fact. Talk frankly about the legal risks. 2. Influence the socializing. Show how to use social networking tools productively and creatively for work without giving away too much information. For example, solicit expertise but don’t get too specific. Wrong: “About to blow major deadline for Project Anaconda. Any SAP Netweaver experts out there? Help!” Right: “Looking for an SAP Netweaver expert.” 3. Consider the complexities. If information posted on social networking sites becomes relevant in a lawsuit, you will have to collect it, review it and search it so you can comply with discovery requests. That may mean your social-networking employees may have to give up some privacy—their site passwords, for example. This particular situation hasn’t yet come up in court, but it could get messy if the employee refuses to cooperate, Mighell notes. 4. Monitor. Designate a couple of people from the tech or legal groups to do sweeps of Facebook, LinkedIn and other known hang-outs of your employees, to see who’s saying and doing what. Talk to those who aren’t following policy, and keep records to prove regular monitoring and enforcement of your rules, he says. You can’t defend yourself if you set policy but never enforce it. Related content brandpost Sponsored by Freshworks When your AI chatbots mess up AI ‘hallucinations’ present significant business risks, but new types of guardrails can keep them from doing serious damage By Paul Gillin Dec 08, 2023 4 mins Generative AI brandpost Sponsored by Dell New research: How IT leaders drive business benefits by accelerating device refresh strategies Security leaders have particular concerns that older devices are more vulnerable to increasingly sophisticated cyber attacks. By Laura McEwan Dec 08, 2023 3 mins Infrastructure Management case study Toyota transforms IT service desk with gen AI To help promote insourcing and quality control, Toyota Motor North America is leveraging generative AI for HR and IT service desk requests. By Thor Olavsrud Dec 08, 2023 7 mins Employee Experience Generative AI ICT Partners feature CSM certification: Costs, requirements, and all you need to know The Certified ScrumMaster (CSM) certification sets the standard for establishing Scrum theory, developing practical applications and rules, and leading teams and stakeholders through the development process. By Moira Alexander Dec 08, 2023 8 mins Certifications Certifications Certifications Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe