12.07.2015 Views

to download - SEDCOR

to download - SEDCOR

to download - SEDCOR

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Employer AnswersManaging Social Networking Activitieswww.sedcor.comPatrice Altenhofen, PresidentCascade Employers AssociationQuestion:I like the idea of on-line social networking, but am concernedthe new technology might be abused by my employees. How canI manage this?Answer:Ask any human resource professional and they will tell you thatthis is one of the most commonly asked questions in the past year.Last week, a company owner “Kim” called in and suggested I“Google” her company name. When I did, a long list of searchresults appeared. She called my attention <strong>to</strong> a result near the <strong>to</strong>pof the list, an employee’s MySpace.com web page. I opened thelink and found a not-so-tasteful pho<strong>to</strong> of the employee. I alsonoticed several pho<strong>to</strong>s of his “contacts” – including a suggestivepho<strong>to</strong> of one apparently underage female, with an eyebrowraisingcaption.The employee’s site did not contain any negative informationabout the company itself; he had only listed the company ashis employer. Still, his site was among the <strong>to</strong>p search results.Needless <strong>to</strong> say, this is not the place Kim wants her cus<strong>to</strong>mers <strong>to</strong>go when searching for product information.Kim’s question was whether she could adopt a policy limitingthe use of her company name on-line. My answer was “yes” – shecould adopt such a policy, and probably should, but only aftercareful consideration of how any limitation on use may impacther marketing and public relations goals.Social networking is becoming the communication <strong>to</strong>ol ofchoice for people of all ages. Many networks are by “invitationonly” while others are open <strong>to</strong> the public. All networks providean opportunity <strong>to</strong> share personal profile information, includingplace of employment. A weblog, or “blog,” is a websitewhere regular entries are made offering opinion,commentary or news on a particular subject. Othersserve as personal online diaries. Most blogs contain text,as well as pho<strong>to</strong>graphs, videos and audio.Some employers find employee networking activitiesand blogs benefit recruitment as well as employeeproductivity and morale. Others encourage the useof blogs <strong>to</strong> promote events or new products, and <strong>to</strong>increase communication among current employees.While these <strong>to</strong>ols have benefits, the potentialfor misuse is significant. Casual networking canjeopardize the professional image of an organization.Blogs increase the risk of compromising confidentialbusiness information and creating conflicts of interest.Reputation, defamation and harassment are alsocommon concerns. Morale can be damaged whennegative comments about the company or its employeesare posted. As you can imagine, the more personalAs part of <strong>SEDCOR</strong>’s alliance with Cascade Employers Association, this featureappears periodically in the Enterprise. Cascade provides employment knowledgeand support in the areas of human resource management, employment lawcompliance, training, pay information, safety and employee benefits.content included in the profile or post, the higher the risk fordamage <strong>to</strong> an employer’s reputation.Because of these risks, employers should adopt policies thatclearly establish the organization’s standards and expectationsfor such communications, as well as the consequences of failing<strong>to</strong> abide by those policies. Employers should also moni<strong>to</strong>r blogs,by conducting periodic company name searches <strong>to</strong> uncoverinappropriate content, conflict and confidentiality concerns.Sample policy language might include:“The Company understands that many employees choose <strong>to</strong>engage in social networking, blogging activities and participatein on-line forums. To preserve the integrity of our name andour image, use of our Company name when engaging in theseactivities is strongly discouraged.”The policy should also address <strong>to</strong>pics such as:• Compliance with company confidentiality rules, conductstandards and harassment policies.• Disclosure of conflicts of interest.• Discussion of co-workers, cus<strong>to</strong>mers, clients, partners orsuppliers.• Use of company equipment and time for networking andblogging activities.Another excellent tip is <strong>to</strong> perform a web-search of your companyname on a periodic basis. This will show you what your cus<strong>to</strong>merssee when they are looking for you. You might be surprised.Call 503-585-4320 or visit www.cascadeemployers.com.Page 33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!