Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Road Map for Social Networkers

Road Map for Social Networkers

Ratings: (0)|Views: 14 |Likes:
Published by api-13247114

More info:

Published by: api-13247114 on Jun 03, 2009
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





Road Map for Social Networkers \u2013 Draft

If you doubt that Social Networking* will find its way into the business processes at
the Air Resources Board, just spend a few hours browsing. Applications are
emerging at a rapid rate \u2013 State agencies are Twittering \u2013 and Cal/EPA is now on
FaceBook. These applications will become more sophisticated over time and
creative minds will find ways to use them to accomplish ARB\u2019s mission efficiently
and with flair.

The down side is that Social Networking and other Web 2.0** applications are well know to create vulnerabilities within the IT Infrastructure. For example, one worm unchecked could wipe out your workstations, the network, our shared file and print services and the applications that reside on the network. None of us want that to happen.

The Office of Information Services (OIS) will continue to maintain and improve the
centralized security systems we provide in an effort to off-set the increased security
threats these applications place on our network. However, the most important
defensive steps must be carried out by ARB staff. As individuals, it is our
responsibility to utilizeWeb 2.0 and/or Social Networking applications with caution.

Web 2.0 and Social Networking application Road Hazards:
1. Do not speak for the ARB without permission and/or disclaimers

2. Do not upload and post any documents that contain confidential or sensitive
information. We recommend that you follow established division approval
processes prior to posting any documentation to the Web.Think of it this way \u2013
don\u2019t post anything that isn\u2019t suitable for the world to see.

3. As individuals that are using Twitter for business, set up a special work account as private to limit the nonsense and keep tighter control over what is posted and to whom.

4. If you tie an account name to the ARB (i.e., using @arb.ca.gov email contact), then follow ARB\u2019s Internet Acceptable Use policies and procedures when using that account \u2013 think of it as \u2018work related\u2019 not as a personal account.

5. If you suspect that you might have gotten a virus or worm, disconnect your
computer from the network immediately and call the Helpdesk @ 916\u2013445-8812

6. Be cautious when trying out new applications and help others by reporting
findings to helpdesk [we should set up a wiki or something to help track?]. Keep
in mind that if you mess up your computer, it may have to be re-ghosted.

7. ARB procurement processes cannot be circumvented. If you take it upon yourself to purchase software or incur expenses outside ARB procurement processes, you may not get reimbursed.

8. Follow the etiquette and \u2018terms of use\u2019 rules that apply for the various
applications that you utilize

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->