Roughly 16 minutes out of every hour spent online are dedicated to social media networks like Facebook, Twitter, Instagram and LinkedIn. Social networking sites like these have become a major part of our culture today. As a result, lines between personal and professional spaces have begun to blur, creating a tangled web of privacy rights, cybersecurity risks and human resources legalities that employers must address.

As the personal/professional web becomes even more tangled, it’s vital for employers to understand ethical and legal boundaries that protect their business from cyber-attacks and reputation damage while also balancing employees’ privacy rights. Employees’ online habits can affect your business, so it's important to carefully examine what should go into your company’s social media policy.

Employees Using Social Media: Issues, Concerns and Risks

While social media is predominantly perceived as a personal activity, poor security habits and inappropriate use of networking sites can have a lasting, damaging effect on a business’ security and reputation.

Velocity Digital reported that 25 percent of Facebook users don’t bother with any privacy settings, meaning anyone, including criminals mining social sites to steal identities, can view information on their profile. If an employee’s identity is stolen, it can be used to log into a company’s network, potentially exposing sensitive customer data or even proprietary information.

For example, Steve Stasiukonis, founder of Secure Network Technologies, decided to test his clients’ network security. He created a fake online identity and used it to join a company’s Facebook page to mine data like email addresses and names. He used this information to send fake phishing emails to employees, asking for network log-in information. He had an unbelievable average response rate of 45 to 50 percent, with employees giving up log-in information and passwords to company networks, which held valuable information such as customer credit card data, intellectual property and other log-in credentials that provide access to deeper network information.

And beyond identity and data theft, inappropriate employee social media use can also damage brand reputation. Provocative or otherwise inappropriate personal employee photos, insensitive or even slanderous posts can reflect poorly on your business.

How can businesses control what employees post on social media? In short, they can’t. At least not entirely. Employees have privacy rights that must be respected. Since online networking can be used for business and pleasure, it’s important for businesses to know where they can draw the line when creating social media policies.

The Legalities of Employees’ Privacy Rights

The most complicated thing about creating an effective social media policy is sifting through the gray areas, such as defining what an employee has the right to post online and what an employer has the right to monitor.

In regard to protecting your business' reputation, the National Labor Relations ACT (NLRA) does not protect employees who post maliciously false, offensive or inappropriate comments about their employer or clients. However, the NLRA does protect employees’ rights to communicate with each other online about improving the conditions of their jobs. Jessica Miller-Merrell, a human resources consultant and founder at Blogging4Jobs, advises using a monitoring service that alerts the business if the company name is used alongside certain keywords online.

Depending on the circumstances, businesses can be accountable for an employee’s social media postings. Washington University in St. Louis Law Prof. Neil Richards said if he hosts a class discussion board on Google+, the university could be liable for anything said within that discussion.

Every state is different, so when creating social media policies, it is in your best interest to consult employer legislation in your state. Another great resource to use when establishing workplace policies is the law firm Seyfarth Shaw LLP’s Social Media Privacy Legislation Desktop Reference. It has social media policies listed  by state.

When it comes to protecting the security of your business, you’ll have the most success by educating employees on the “hows” and “whys” of practicing secure online habits. Encourage employees to decrease the possibility of identity theft by making online profiles as private as possible. This first and foremost will protect the employee from the hassle of having to spend time, money and resources on resolving a stolen identity and will also protect the business from any associated risks. Employees should also keep a clean professional online presence, as many companies use social media as a means for hiring. In 2013, a Jobvite survey found that 42 percent of companies have reconsidered job candidates based on the content of their social profiles, including Facebook, Twitter and Google+. While it’s important to the business for employees to keep a positive reputation online, it is also in the employees’ best interests.

 Social Media Policy Best Practices

When creating a social media policy to protect your business from security and reputational damage, remember to keep employee privacy top-of-mind. Here are three best practices to consider when creating your business’ social media policy:

  • Require that company credentials are different from personal credentials.
    Username and password reuse happens all the time online. Since you cannot control employees’ personal social networking log-ins, protect your network by requiring employees to use unique company usernames and passwords that are not similar to the usernames and passwords they use for social networking sites. Better yet, require password updates every few months.
  • Be clear on what employees can and cannot share about the business within their networks.
    Be as transparent as possible with employees about what they can and cannot share online about the company. Can they connect with clients online and on what networks? What preapproved content can they share with clients, family and friends?
  • Use monitoring to ensure that no sensitive information is shared.
    Minimize risk by monitoring what is being said online about your company. This helps to make sure employees are sticking to the policy and that no sensitive information is shared online.

Written By

Joe Ross


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

It's Innovation Awards Time!

We're searching for today's privacy innovators. Sound like anyone you know? (Perhaps even you?) Tell us about it! We'll announce the winners at P.S.R.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

It's Innovation Awards Time!

We're searching for today's privacy innovators. Sound like anyone you know? (Perhaps even you?) Tell us about it! We'll announce the winners at P.S.R.

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

NEW! Raise Staff Awareness

Equip all your data-handling staff to reduce privacy risk, with Privacy Core™ e-learning essentials.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

Get Schooled in Privacy

Looking to get some higher-ed in privacy? Check out these schools that include data privacy courses in their curricula.

Are You Ready for the GDPR?

Check out the IAPP GDPR Readiness Assessment Powered by TRUSTe and find out where you stand when it comes to GDPR compliance.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

More Resources »

The IAPP Asia Privacy Forum Returns

Delivering inspired education and discussion on the top data protection issues of today, you can’t miss it. Register now.

P.S.R.: Lewinsky to Explore Online Shaming

With three stellar keynotes confirmed, incl. Monica Lewinsky, we’ve opened registration early so you can secure your spot now.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

It's Innovation Awards Time!

We're searching for today's privacy innovators. Sound like anyone you know? (Perhaps even you?) Tell us about it! We'll announce the winners at P.S.R.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»