Bart Perkins: Who owns your tweets?
Both corporations and their employees who tweet on the company's behalf must clarify the question
Computerworld - When Noah Kravitz was PhoneDog's editor in chief, he created a Twitter account and began tweeting for the company. PhoneDog claims that, after Kravitz left in October 2010, he continued to use its corporate account to tweet on behalf of himself and his new employer, merely changing the name on the account. Now PhoneDog is suing to reclaim that Twitter account and the list of followers tied to it. It's seeking $340,000 in damages.
This dispute, along with others, demonstrates that laws have not kept pace with the evolution of social media. Courtney Hunt, a principal of Renaissance Strategic Solutions, says organizations must take steps to protect themselves until legislation or case law clarifies legal parameters. Specifically, employers should do the following:
Clarify and document agreements. It's crucial to have employment agreements, confidentiality agreements and non-competes for all employees, but it's particularly important to have them for anyone who communicates with the public on the organization's behalf. These documents should make it clear that corporate social media accounts are company property and have quantifiable value.
Celebrities require special care when hired to represent a company. The celebrity will almost certainly have a significant following before starting work with your organization. Be clear what happens when the company and the celebrity end their partnership. To which followers can you communicate, how frequently, and for how long? If the celebrity also represents a complementary brand (e.g. sports equipment and energy drinks), do those answers change?
Update corporate communication guidelines. Typically, only a few people are authorized to speak publicly for any organization. Public relations controls what they say and how they say it. Because social media emerged as a form of personal communication before being adopted for corporate marketing, most policy manuals do not define how employees should use social media on behalf of the organization.
Create internal procedures. Make sure an authorized representative registers all corporate social media accounts. Don't take over accounts employees have registered personally. State clearly who is authorized to post what information. And consider having more than one person post, so that staff turnover doesn't have a noticeable impact on the organization's communication style.
Plan an ethical endgame. Treat departing employees professionally. Salespeople, recruiters and others are hired partially for their industry contacts. During their employment, they should be expected to enter job-related contacts in the CRM (not just in their LinkedIn account). However, it is unreasonable to expect employees to turn over all their professional connections when they leave. Don't ask them to relinquish their LinkedIn account or other personal social media accounts. News of unfair treatment travels fast. Acquiring a reputation as a bad workplace hurts morale and hinders recruiting, particularly when departing employees are connected to your organization's customers and business partners.
More by Bart Perkins
- Bart Perkins: Forget the expense -- more secure credit cards are an opportunity
- Bart Perkins: A project staffing worst practice
- Bart Perkins: How to keep projects on track
- Bart Perkins: Power to the people's devices
- Bart Perkins: Pester no more: How to handle the FCC's new rules on robocalls
- Bart Perkins: 3D printing is IT's next big challenge
- Bart Perkins: Benchmarking is great, when it's not a waste
- Bart Perkins: Global standards, meet local constraints
- Bart Perkins: Congratulations on your new supplier. Got a good prenup?
- Bart Perkins: Can't buy you love
- Simple Solution, Big Capability Meet growing employee and business demands by connecting up to 1,000 users with powerful collaboration capabilities with a single, integrated platform -- Cisco...
- The DDoS Threat Spectrum Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Need to Replace MS Threat Management Gateway? Read this article to learn how F5's Secure Web Gateway solution provides a full set of features that can help you successfully migrate...
- The Shortfall of Network Load Balancing Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access...
- Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc. See how Kony, Inc., a leading enterprise mobility company, is using TIBCO Jaspersoft for Amazon Web Services and Redshift to achieve embedded analytics...
- Cloud BI Overview: Jaspersoft for AWS Check out this overview of Jaspersoft for AWS, to easily and affordably build business intelligence solutions as well as embed visualizations and analytics... All Web Apps White Papers | Webcasts