Security7 Blog

This is some blog description about this site

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Posted by on in Best Practices

Your Company's Social Media Policy

The time to implement a social media policy is now.

Your social media policy outlines for employees your companies guidelines or principles for communicating in the online world.  Your company should have a communications policy in place that spell out your expectations for phone and email, it’s important that you add social media and online site usage to this policy.

Here is an excerpt from our employee manual in regards to Electronic Privacy. Feel free to use the information when revising or creating your social media policy.   You may also want to consider adding in repercussions for not following the policy:

Electronic Privacy

All electronic media, (computers, telephones, faxes, etc.) on the premises are owned by Directive which reserves and maintains its right in control over these pieces of equipment at all times. You will have no right to expect privacy when utilizing these facilities.

*Any fax, telephone, email, internet or intranet communication may be monitored.

Social Media

  • There is no right to privacy with electronic communications; including social media.
  • Use common sense and be responsible:  Exercise good judgment and common sense when writing about the organization and its representatives.   You are personally responsible for the content published or blogged in any online media.
  • Be Authentic: Let people know who you are, put your name and title when communicating anything concerning the company.  Customers prefer to buy from those they know and trust.
  • Consider your audience: You want to consider who your readers are; you don’t want to alienate groups because of something you may say.
  • What You Say: Avoid slang, obscenity, slurs, anything demeaning or inflammatory.  Think twice before hitting submit.
  • Understand Our Online Community: The Company’s online followers, customers should feel comfortable sharing, connecting and receiving help from you.
  • Confidential and Proprietary Information: Don’t provide the company's confidential and other proprietary information.  Permission to publish or report internal/private conversations is required.
  • Exercise Moderation: Set an acceptable limit to check update status, or send messages.   It is important to continue being productive.   Keep in mind our company monitor policies are in effect.
  • Value: Provide worthwhile information.  You best represent our company and what you publish may affect it.
  • Copyrights: Respect peoples' work and give them credit when it’s due.
Last modified on


  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Saturday, 25 April 2015


Tag Cloud

Virtualization Leadership Wireless Technology Windows Gaming Console Software Remote Computing Business Computing Computer Repair Security Hacking Streaming Media Browser Windows 8.1 Update Tablet Conferencing File Sharing Statistics Hiring/Firing Competition Licensing Mobile Devices Social Media History Mobile Computing Cloud App Collaboration LinkedIn Social Digital Payment Health Excel Education Mobile Office Bring Your Own Device Antivirus USB Quick Tips Artificial Intelligence Android Workplace Tips User Tips Piracy Sports Miscellaneous Video Surveillance Disaster Recovery Trending Money IT Support Business Apple Privacy Hosted Solutions Congratulations Best Practice Law Firm IT Smartphone Hackers Application Smartphones Communication Windows 8 Network Operating System Scheduling Hardware Saving Money Troubleshooting VoIP Automation Gadgets Windows 10 Proactive IT Crowdfunding Bluetooth IT Solutions Social Networking Text Messaging Unified Threat Management Efficiency Hard Drives Content Filtering Password Customer Relationship Management Tip of the Week Business Management Computer Accessories Phone System Big Data Display User Computer Technology Disaster Vendor Management Printer Phone Systems Customer Service Business Growth Microsoft eBay Environment Wearable Technology Information Technology Outlook Passwords Debate Inbound Marketing PowerPoint Internet Help Desk Small Business IT Consultant Marketing Productivity Chrome Facebook Save Time Mouse Innovation Programming IBM Avoiding Downtime Email Retail Going Green Touchscreen Tech Support Webinar Net Neutrality Fax Server Managed Service Provider The Internet of Things Skype Analytics Specifications Humor Laptop Save Money Point of Sale Business Intelligence Business Continuity BYOD Online Currency Office Current Events Apps Virus Macro Twitter Firewall Consumers Alerts Alert Remote Monitoring Memory Business Owner Best Available Webcam Users WiFi Analyitcs Upgrade Maintenance Downtime User Error Data Scam Augmented Reality Lithium-ion Battery Samsung Saving Time Company Culture VPN Holiday Microsoft Office Search iPhone PC Care Backup Google Mobile Device Management Spam eWaste IT Services Server Presentation Best Practices People Malware Thank You 3D

Latest Blog Entry

How to Troubleshoot A Failed Backup
Your business relies on its IT to get things done, but if disaster were to strike, would you be able to recover efficient operations without having to deal with the numerous...
Continue Reading...

Latest News

North Boston Media Group Case Study

Security7 painlessly implements Metro Ethernet fiber network with Comcast for North of Boston Media Group.



Contact Us

Learn more about what Security7 can do for your business.


Call us today    (877) 664-9379

Fax:(888) 673-6470

861 Lafayette Road
Unit 4
Hampton, New Hampshire 03842