Computerworld - This version of the story originally appeared in Computerworld's print edition.Claiming to be an Exxon Mobil Corp. employee, a user of the Twitter microblogging site created a page on July 28 with the company's name, part of its logo and photos of an Exxon gas station. As of last week, more than 400 other users had signed up to receive the messages being posted by "Janet at ExxonMobil."
But Exxon Mobil said that it hadn't authorized the activities on Twitter and doesn't know who Janet is or if she or he really does work at the company.
Whoever is posting the messages "is not an authorized person to speak on behalf of the company," said Exxon Mobil spokesman Alan Jeffers. He added that Exxon Mobil hasn't officially started using any social networking sites to communicate with customers.
Jeffers said that after becoming aware of the page created by Janet, Exxon Mobil contacted officials at Twitter Inc. and asked them to reserve for the company's use any potential account names associated with its various business brands. The Twitter execs agreed to do so, according to Jeffers.
As of Friday, the unauthorized page was still live, and Janet had begun posting new messages, after a two-day absence.
The tenor of the posts seems to be positive toward Exxon Mobil. But some have been political, and others controversial, such as one that seemed to minimize the 1989 Exxon Valdez oil spill. Jeffers said the messages also contained "several inaccuracies," from the company's standpoint.
Forrester Research Inc. analyst Jeremiah Owyang said in a blog post that companies need to track Twitter and other Web 2.0 sites to make sure that they don't get "brand-jacked." Businesses "should be monitoring the discussion and [uses] of their keywords in social networks -- failure to do so results in becoming case studies," Owyang wrote.
Shel Holtz, principal of Holtz Communication + Technology, a consulting firm that focuses on corporate communications on the Web, agreed in his blog that the Janet case should be a wake-up call for corporate officials. "Far too many organizations shrug off emerging social media channels," he wrote.
Got something to add? Let us know in the article comments.
Read more about Networking in Computerworld's Networking Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- Live Webcast
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Knowledge Center White Papers | Webcasts