thetical situations, don’t worry— you’re not alone.
Many employers are not ready for the Web 2.0. What’s that? According to Wikipedia (itself a social interaction tool), the term “Web 2.0” is commonly associ-ated with web development and web design which facilitate in-teractive information sharing, interoperability, user-centered design and collaboration on the World Wide Web.1 But, we just
got comfortable with the Web 1.0. Well, it’s a brand new world and your employees want access to it at home, on their mobile devices, and at work. Every com-pany needs a Web 2.0 policy that adequately protects its reputation and its employees. This article walks you through what you need to know about drafting and im-plementing a social media policy for your workforce.
Before we get to our policy, however, let’s go over the typi-cal social media tools used by your employees.
of real concerns resulting from new uses of technology that your typical Internet-use policy simply doesn’t address. Don’t believe me? Let’s test my hypothesis out. What does your company policy say about the following situations: z An employee starts a
Face-book Group about working at your company that triggers an online rumor mill.
z One of your employees is feeling uncomfortable about the LinkedIn request she received from her manager but is worried about how she will be perceived if she doesn’t accept it.
z An anonymous blogger has started writing about your company in a less than com-plimentary fashion; and z One of your employees
called in sick but “tweeted” later in the day about how much fun the beach was. If your company policies do not address those types of
hypo-ETHAN ZELIZER is an attorney in Drinker, Biddle & Reath, LLP’s Labor and Employment practice. When he is not counseling companies on all sorts of employment-related issues or defending them in single plaintiff and class cases around the country, he tweets about social media in the workplace at www.twitter. com/ethanzelizer.
embraCinG and
ControllinG soCial
media in the WorKplaCe—
ten rules
Ethan Zelizer
Human resources profession-als know more today than they ever have. The sheer amount of knowledge to be had has grown exponentially in the last two de-cades. It started with the flurry of employment-related federal, state and local laws that changed the way we do business and manage our workforce. Through years of honing policies, procedures, handbooks and manuals, we de-veloped a plethora of protocol aimed at keeping our workforce productively buzzing along while complying with those employ-ment laws we all know and love. However, not all changes in poli-cy result from changes in the law. Technology is taking center stage and invading all aspects of the workplace. Today, there are a host
z
z Facebook. Facebook allows users to put up and share content like photos, videos, notes, blogs, web links, and news stories (the social me-dia function) but it is also an excellent example of a so-cial networking site because users can link to other us-ers or “friends,” send them messages, and update their personal profiles to notify friends about themselves.2
By far, Facebook is the most popular social networking tool in the wild. From 2008 to 2009, Facebook grew 228% to add 65.7 million new users.3 Chances are,
75% of your workforce un-der the age of thirty-five are using Facebook.4
z
z MySpace. MySpace is a lot like Facebook—a social networking tool that allows its users to create profiles, post content, and connect with other users or a “cool new person.” MySpace al-lows users to customize their user profile pages by enter-ing HTML code into such areas as “About Me,” “I’d Like to Meet,” and “Inter-ests.” Videos and flash-based content can be included this way. Users also have the op-tion to add music to their profile pages via MySpace Music, a service that allows bands to post songs for use on MySpace.5
z
z LinkedIn is a business ori-ented social networking website that focuses on pro-fessional networking. The purpose of the site is to allow registered users to maintain a list of contact details of peo-ple they know and trust in business. The people in the
list are called “Connections.” Users can invite anyone (whether a site user or not) to become a connection. A user’s list of connections can then be used to form a con-tact network consisting of their direct connections, the connections of each of their connections (termed “sec-ond-degree connections”) and also the connections of second-degree connec-tions (termed “third-degree connections”). This can be used to gain an introduc-tion to someone you wish to know through a mutual, trusted contact. In this way, LinkedIn is useful to find jobs, people and business op-portunities recommended by someone in one’s contact network. LinkedIn employs the “gated-access approach,” where contact with any pro-fessional requires either a preexisting relationship, or the intervention of a contact of theirs. This is intended to build trust among the ser-vice’s users.6
z
z Blogger. Blogger is the most popular website for hosting blogs. “Blog” is a contrac-tion of the term “web log.” A blog is an entry of com-mentary, a description of an event or events, a web link, graphics, or video posted on a website. Blog entries are commonly displayed in reverse-chronological order. “Blog” can also be used as a verb, meaning to maintain or add content to a blog. Many blogs provide commentary or news on a particular sub-ject, others function as more personal online diaries. A typical blog combines text,
images, and links to other blogs, websites, and other media related to its topic. Blogs embody the concept of social media because readers have the ability to interact and leave comments on the blog posts. Most blogs are primarily textual, although some focus on art, photo-graphs, sketches, videos, mu-sic, and audio. The collective community of all blogs is known as the “blogosphere.” Discussions “in the blogo-sphere” have been used by the media as a gauge of pub-lic opinion on various issues because all blogs are seen as interconnected and socially networked.7
z
z Micro-bloggingz (“Twit-ter”). Micro-blogging is another type of blogging, featuring very short posts. Twitter is a micro-blogging service that enables its users to send and read messages known as “tweets.” Tweets are text-based posts of up to 140 characters displayed on the author’s profile page and delivered to the author’s subscribers who are known as “followers.” Authors can restrict delivery to those in their circle of friends or, by default, allow open access.8
A recent study finds that Twitter will have over 18 million users by 2/1/2010.9
As for the times of the day when the most Twitter ac-tivity happens: that would be between 11:00–3:00 (EST) / 8:00–noon (PST) (i.e., the work day).10
Notably, all of these social networking tools work on mo-bile devices (cell phone, iPhone, Blackberry, etc.). Indeed, more
across social, professional, and le-gally-protected classes (age, race, gender, national origin, religion, etc.). There is a growing recog-nition in the courts that Internet use is a term and condition of employment that can form a basis for discrimination, retaliation and various state law claims. More-over, given an employee’s ability to access and update social media sites on mobile devices, be ready to deal with “social sneaking”– an employee’s incognito use of social media on the job.
Moralez andz Reputation:
Many companies that have banned social media in the workplace have encountered morale issues— especially with those employees under the age of forty. Most em-ployees don’t think they are doing anything wrong when they access social media websites at work. Rather, they consider it a use of their break time or lunch time or simply a quick way to update a friend or significant other about real life commitments without the need to pick up the phone. An outright ban on social media in the workplace may result in low morale, backlash or, in some cases, a mini-exodus of a com-pany’s younger, more computer-savvy workforce. Your compa-ny’s decision regarding whether an employee may access social media tools in the workplace may affect the way future candidates and current employees view you in the marketplace. Moreover, those same individuals may take it out on your company outside of work on message boards, blogs or through other informal social means. Whether it is fair or not, your decision regarding this issue may have a serious affect on your company’s reputation.
Undoubtedly, you have gath-ered that I favor regulated use of social media in the work place. In my experience, outright bans on social media cause Compa-nies more harm than good and result in unintended consequenc-es. Moreover, this wouldn’t be much of an article if I advocated an outright ban. So, assuming you haven’t stopped reading this, let’s take a closer look at regulating so-cial media.
rule 2. deFine soCial media and soCial netWorKinG
The first step to an effective social media and social networking poli-cy is a clear and concise definition that informs your employees that their company knows what it is policing. Here is an example of an effective definition: “For purposes of this policy, social media is the authoring, reading or contribu-tion of /to blogs, wikis, social net-works, virtual worlds, or any other kind of online social interaction. Whether you keep a blog, log into Twitter, LinkedIn, Wikipe-dia, MySpace or Facebook pages, or comment on online media sto-ries—this policy applies to you.” rule 3. mothers and neWspapers
Companies have taken many dif-ferent approaches to annunciating a “golden rule” for social network-ing. I like to start with two guiding principles: first, would you want your mother reading what you just posted; and second, would you feel comfortable seeing what you just wrote on the cover of the Wall Street Journal? If the answer is “no” to either of these ques-tions, you are not in compliance with this Policy and you should than 50% of all social networking
updates occur on mobile devic-es—during work hours.11 Perhaps
more surprisingly, 15% of all so-cial media updates in the work-place come from employer-pro-vided Blackberries or similar mo-bile devices.12 Okay, three more
convincing statistics: (1) three out of four Americans use social me-dia13; (2) two thirds of the global
Internet population visit social networks14; and (3) visiting social
media sites is now the fourth most popular online activity—ahead of personal email.15 Clearly, the Web
2.0 has infiltrated the workplace. Now, how do we regulate it? rule 1. reGulation or prohibition?
The first rule is more of a fun-damental consideration. Your company needs to make a deci-sion. Will it forbid social media altogether or will it recognize its prevalence in and out of the workplace and regulate its use. For most employers, outright bans on social media makes sense. Ac-cording to a survey of 1,400 chief information officers from U.S. companies with 100 or more em-ployees, 54% of businesses have completely prohibited social net-working sites in the workplace.16
What’s more, only 19% of those companies surveyed permit social media usage for business-purposes only and 16% for limited personal use, while just 10% allow em-ployees full access to social net-works.17 There are, however, two
serious issues you need to consid-er before jumping on the prohibi-tion bandwagon.
Enforcement: If your com-pany has a policy that prohibits usage of Web 2.0 sites, be ready to enforce it—consistently and
stop whatever it is you are doing. If the answer is “yes” to both of these questions, then further apply the following guidelines.
rule 4. the employee is responsible
This is where an employer can re-ally catch an employee’s attention. “The employee is responsible for what s/he posts. The employee is personally responsible for any of his/her online activity conducted with a company email address, and/or which can be traced back to the company’s domain, and/ or which uses company assets.” Employees should know that whether they mean to or not, the (EMPLOYER DOMAIN).com address attached to their name implies that they are acting on the company’s behalf.
Every policy should also include some version of the following: “When using a business email ad-dress or business assets to engage in any social media or social network-ing activity (for example LinkedIn), all actions are public, and employ-ees will be held fully responsible for any and all said activities.”
Finally, employees should be warned about social networking and social media and their em-ployment generally. Assuming you are an employment at-will employer, it is fair to state some-thing like the following: “When outside the work place (whether it be on your home computer or with your personal e-mail ad-dress), you are still fully responsi-ble for the content you post pub-licly. The company reserves the right to act on any publicly avail-able content that may be consid-ered material to the working re-lationship. The company reserves
the right to determine what may or may not be material.”
Let’s take a look at that last passage. I know we are getting into some tricky areas regarding free speech and the like; howev-er, there are times in which the employer will be within its rights to act on “personal” social media posts because of the nature of the content. Your company needs to put the employee on notice and give itself some wiggle room. Here are some examples of where personal “social media” posts will likely trigger a company response: (1) evidence that an employee lied about something material to the job—credentials, attendance, etc.; (2) evidence that an em-ployee is dangerous to himself or others—threats to others, suicidal tendencies; (3) evidence that an employee is engaging in harass-ment—racially, sexually, etc.; and (4) evidence that the employee is bad-mouthing the company. In each situation, the employee is posting something that likely breaks the two golden rules I be-gan with—mothers and newspa-pers. Thus, it is easy to see why an employer would want to give itself plenty of discretion in deter-mining what to act on and how.
Note, however, that before acting on any of these types of posts, your company should con-sult an employment attorney. Most of these situations under-score major legal issues like dis-crimination (harassing posts), defamation (bad-mouthing the company), the Americans with Disabilities Act (evidence that the employee may be suffering from a protected condition) and many, many others. Like any employ-ment-related issue, upfront sound
legal advice is your best weapon against lawsuits.
rule 5. FolloW the Company’s other rules There are likely plenty of other policies at your company that hit on this subject. Your company should make it clear that rules regarding conduct, respect and harassment should also apply to employee behavior within social networking and other public on-line spaces.
rule 6. FolloW the Venue’s rules
One easy way to avoid unneces-sary and unpleasant discourse is to follow the venue’s rules. An em-ployee who aggravates others on a social networking site may draw negative attention to you and your company. Employees should be advised to follow the terms and conditions of use that have been established by each venue used for your social networking activities. rule 7. FolloW the laW It may go without saying but em-ployees should be warned not to post any information or conduct any online activity that may vio-late applicable local, state or fed-eral laws or regulations.
rule 8. respeCt the priVaCy oF others
Employees should not feel obliged to accept Facebook “friend re-quests,” LinkedIn “connection requests” or any other social net-working invitation. Such a re-quest may be unwanted, unpleas-ant or in some cases, a form of ha-rassment. Employees should also respect the privacy and opinions of others. Therefore, it is a best practice not to invite co-workers
valuable member of your orga-nization. Take the time to learn what you can about the technol-ogy and develop your own ways to educate and regulate employ-ees. Your business will thank you. n
notes
1. http://en.wikipedia.org/wiki/Web_2.0 (last visited on October 10, 2009). 2. http://en.wikipedia.org/wiki/Facebook
(last visited on October 10, 2009). 3. http://en.wikipedia.org/wiki/Facebook
(last visited on October 10, 2009). 4. http://en.wikipedia.org/wiki/Facebook
(last visited on October 10, 2009). 5. http://en.wikipedia.org/wiki/Myspace
(last visited on October 10, 2009). 6. http://en.wikipedia.org/wiki/LinkedIn
(last visited on October 10, 2009). 7. http://en.wikipedia.org/wiki/Blog (last
visited on October 10, 2009).
8. http://en.wikipedia.org/wiki/Twitter (last visited on October 10, 2009).
9. http://www.emarketer.com/Article. aspx?R=1007271 (last visited on October 11, 2009).
10. http://www.sysomos.com/insidetwitter/ (last visited on October 11, 2009). 11. http://en.wikipedia.org/wiki/social_
networking (last visited on October 10, 2009).
12. http://en.wikipedia.org/wiki/social_ networking (last visited on October 10, 2009).
13. FORRESTER, The Growth Of Social Technology Adoption, Josh Bernoff (2008). 14. FORRESTER, The Growth Of Social Technology Adoption, Josh Bernoff (2008). 15. FORRESTER, The Growth Of Social
Technology Adoption, Josh Bernoff (2008). 16. http://www.wbjournal.com/news44683.
html (last visited on October 10, 2009). 17. http://www.wbjournal.com/news44683.
html (last visited on October 10, 2009). out having to incur the costs of a
full-blown trial).
rule 10. neVer speaK For the Company
With few exceptions, employ-ers do not want their employees speaking for the company. Em-ployees should be told that they should not use the company’s name in their identity (e.g. user-name, “handle” or screen name), nor should they speak as a repre-sentative of the company. If a me-dia inquiry is generated, employ-ees should be directed to refer the inquiry to the appropriate person. ClosinG thouGhts
From both a logistical and legal perspective, social media is a jug-gernaut for employers. It’s flu-id, informal, uncontainable and sometimes anonymous. How-ever, ignoring social media in the workplace may cause far more damage to your company than addressing it. Whether your com-pany’s first experience with the technology is through a lawsuit stemming from online harassment or learning that your company is taking a beating in the blogo-sphere based on comments from an “anonymous” insider, chances are somebody in your organiza-tion is going to ask why there wasn’t a proactive policy on the books to possibly prevent the situ-ation in the first place. Moreover, knowing how to use and regulate social media can make you a very to social networking groups. If
employees do have professional contacts within their social net-work, before sharing a comment, post, picture, or video through any type of social media or net-work, the employee should be advised to think twice or else risk offense. Again, this is a good place to mention that online social ac-tivity can result in real life em-ployment problems.
rule 9. reFrain From postinG reCommendations
LinkedIn and other professional-minded sites allow users to post recommendations for members of their social network. Employ-ees should be strongly discour-aged from recommending or dis-cussing another current or for-mer employee. Besides the obvi-ous issues relating to defamation, this type of seemingly innocuous post may be catastrophic to an employer’s defense of a lawsuit by that employee. It is “bad evi-dence” if a fired employee claim-ing discrimination can point to a glowing informal review from a supervisor on LinkedIn or else-where. If the employer’s defense is poor work performance, that recommendation in and of itself may provide the employee all the pretext s/he needs to withstand summary judgment (the ability to win a case on paper after dis-covery has completed but