RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Heraldo, Karen (CA - Toronto)" <[log in to unmask]>
Reply To:
Records Management Program <[log in to unmask]>
Date:
Wed, 13 Nov 2013 18:58:30 +0000
Content-Type:
multipart/mixed
Parts/Attachments:
text/plain (4 kB) , text/plain (4 kB)
It should be by invitation and not invasion - agree. It is the systems themselves that highjack the address list and send out requests to join and not the users themselves. An option of not sending to that list is offered but interestingly enough does not always work and so it becomes an embarrassment to the user. 

Anything in the online world today is a security risk, it's how we as global citizens of the net now respond to this new world.
The democratization of analytics and millennials who process and learn differently now in the workplace have changed the landscape.

RM's are leaders here when we embrace what Mark Peasely Deputy Director at US Department of Homeland Security recently inspired me with by saying "Good Records Management is not looking for a piece of the pie, rather that supporting element to make whole mission effective" 

For myself I choose the ones that work best for me and don't stress about not being "LinkedIn" :)

K


-----Original Message-----
From: Records Management Program [mailto:[log in to unmask]] On Behalf Of Hugh Smith
Sent: Wednesday, November 13, 2013 1:40 PM
To: [log in to unmask]
Subject: [RM] Twitter, Tweets, LinkedIn and Facebook

I have been receiving requests from some of the RM List, as well as other acquaintances to join one of the social networks.

Most people consider it really rude to start receiving requests to join; because the option is to "Accept" the invitation or continue to be harassed day after day with the repeat of the invitation.

I think that Emily Post would suggest that you first assume that most people do not wish to be linked via these highly intrusive and highly insecure networks. The correct protocol could be to call on the phone or send an email via traditional email asking if they have an interest.  Only after an approval should you expose them to invitations via an automated system.

Every one of the Social Network systems has proven to be a true security risk. If I had an employee who joined one of these networks, I would terminate them.

I imagine that some of your corporations will soon adopt these same harsh requirements. The viruses are growing more and more dangerous.  "Ransomware" has the same capability to destroy records archives as a fire.  Linked-in was hacked, Facebook as well and on and on.  Each one exposes more of your passwords and critical data by which you create your personal passwords, and if you have any rights on your corporate IT systems, then you become a risk.

I see new job applicants being asked about their electronic behavior similar to  drug use, criminal activity and so on.  "Have you ever belonged to a social network where you exposed personal information to their password program?" "Do you have social relationships that might expose an employer to risks from your past social partners?"

Cell phones, smart phones, cameras, personal lap tops, iPads, tablets and Kindles are now taken at the security gate and locked away.  In some cases, you may be required to submit them to IT for scanning to see if you have engaged in unsafe social communicating.  HIPAA was the tip of the iceberg.  Now this type of security will spread everywhere.

Your next job application will look at your electronic behavior like promiscuous behavior in a drug user community. Twitter will be like reusing a dirty needle. Any teenager who can write code can create an encryption code that could tank a major company.  They ask for the ransom but in most cases, they never really tested their own key so they have ability to unencrypt. Storing back up tapes in a secure location is the key to recovery but secure social behavior is the new frontier. The only safe social computing is no social computing.

RM's should be the leader here.

Hugh Smith
FIRELOCK Fireproof Modular Vaults
[log in to unmask]
(610)  756-4440    Fax (610)  756-4134
WWW.FIRELOCK.COM

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]






Confidentiality Warning: This message and any attachments are intended only for the use of the intended recipient(s), are confidential, and may be privileged. If you are not the intended recipient, you are hereby notified that any review, retransmission, conversion to hard copy, copying, circulation or other use of this message and any attachments is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return e-mail, and delete this message and any attachments from your system. Thank you. Information confidentielle: Le présent message, ainsi que tout fichier qui y est joint, est envoyé à l'intention exclusive de son ou de ses destinataires; il est de nature confidentielle et peut constituer une information privilégiée. Nous avertissons toute personne autre que le destinataire prévu que tout examen, réacheminement, impression, copie, distribution ou autre utilisation de ce message et de tout fichier qui y est joint est strictement interdit. Si vous n'êtes pas le destinataire prévu, veuillez en aviser immédiatement l'expéditeur par retour de courriel et supprimer ce message et tout document joint de votre système. Merci. List archives at http://lists.ufl.edu/archives/recmgmt-l.html Contact [log in to unmask] for assistance To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message. mailto:[log in to unmask]

ATOM RSS1 RSS2