RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Hugh Smith <[log in to unmask]>
Reply To:
Records Management Program <[log in to unmask]>
Date:
Wed, 13 Nov 2013 13:40:14 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (29 lines)
I have been receiving requests from some of the RM List, as well as other acquaintances to join one of the social networks.

Most people consider it really rude to start receiving requests to join; because the option is to “Accept" the invitation or continue to be harassed day after day with the repeat of the invitation.

I think that Emily Post would suggest that you first assume that most people do not wish to be linked via these highly intrusive and highly insecure networks. The correct protocol could be to call on the phone or send an email via traditional email asking if they have an interest.  Only after an approval should you expose them to invitations via an automated system.

Every one of the Social Network systems has proven to be a true security risk. If I had an employee who joined one of these networks, I would terminate them.

I imagine that some of your corporations will soon adopt these same harsh requirements. The viruses are growing more and more dangerous.  “Ransomware” has the same capability to destroy records archives as a fire.  Linked-in was hacked, Facebook as well and on and on.  Each one exposes more of your passwords and critical data by which you create your personal passwords, and if you have any rights on your corporate IT systems, then you become a risk.

I see new job applicants being asked about their electronic behavior similar to  drug use, criminal activity and so on.  “Have you ever belonged to a social network where you exposed personal information to their password program?” “Do you have social relationships that might expose an employer to risks from your past social partners?”

Cell phones, smart phones, cameras, personal lap tops, iPads, tablets and Kindles are now taken at the security gate and locked away.  In some cases, you may be required to submit them to IT for scanning to see if you have engaged in unsafe social communicating.  HIPAA was the tip of the iceberg.  Now this type of security will spread everywhere.

Your next job application will look at your electronic behavior like promiscuous behavior in a drug user community. Twitter will be like reusing a dirty needle. Any teenager who can write code can create an encryption code that could tank a major company.  They ask for the ransom but in most cases, they never really tested their own key so they have ability to unencrypt. Storing back up tapes in a secure location is the key to recovery but secure social behavior is the new frontier. The only safe social computing is no social computing.

RM’s should be the leader here.

Hugh Smith
FIRELOCK Fireproof Modular Vaults
[log in to unmask]
(610)  756-4440    Fax (610)  756-4134
WWW.FIRELOCK.COM

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2