Social media is another communication tool to help you get your message out, create connections and build goodwill with your audiences over time. Keep the following in mind as you do so.
Before you launch a social-media channel, please consider the following questions:
Outline your goals like you would with any communication or marketing campaign. Social media is another channel for your content. Use it wisely.
Determine where your audience is and concentrate your efforts on building one platform before adding another. It takes concerted time to listen, engage and inform. Social media is meant to be a conversation, not a one-way broadcast.
Your social media channel(s) will reflect on your department and, ultimately, the university as a whole. Consider whether your unit has the time and personnel to 1) create or curate quality content on a regular basis (that drives traffic to your own website as much as possible), 2) post engaging content daily, and 3) monitor and respond often. Social media doesn’t create your stories, it tells them.
Post content that your followers enjoy and want to share. This will not only keep them coming back for more but also increase your chances for better reach (via Facebook’s algorithm).
Don’t feel the pressure to use every social media channel out there. Start with a realistic plan for one or two and get good engagement with those first.
Establish performance metrics upfront that are tied to organizational strategy. Find out what did well, and why. Adapt accordingly.
You may think your campaign content is interesting and written in a way that appeals to students. Find out if that’s really true.
Don’t respond on behalf of the university, your department or a professor unless you have the correct facts and information. Direct the questions to the appropriate website or person in your network.
Exercise sound judgment and common sense. Trust your gut. Familiarize yourself with compliance obligations under FERPA and university policies prohibiting discrimination and harassment. Refrain from conversations that may create the appearance of lobbying.
Show proper respect for laws governing copyright and fair use. Be sure to receive permission for sharing images protected by copyright. A best practice is to always credit a source, unless the photo credit is referenced in the linked story itself.
Collaborate with other social media managers across campus to help amplify your or their content. Be courteous with considerate lead-time when possible.
Support campus efforts to build a strong brand when creating graphics, using logos or composing Facebook posts or tweets.
Please keep the following concerns in mind:
As stated in the UC Electronic Communications Policy (page 10, “Privacy and Confidentiality”):
“The university recognizes that principles of academic freedom and shared governance, freedom of speech, and privacy hold important implications for the use of electronic communications. This policy reflects these firmly held principles within the context of the university’s legal and other obligations. The university respects the privacy of electronic communications in the same way that it respects the privacy of paper correspondence and telephone conversations, while seeking to ensure that university administrative records are accessible for the conduct of the university’s business.”
As stated in UC Statement of Privacy Values (page 2, “UC Privacy Principles”):
a. Free inquiry: “The university is guided by First Amendment principles and is committed to encouraging its members to exercise free discourse without fear of reprisal or intimidation, subject to the privacy and safety of other individuals or university resources.”
b. Respect for individual privacy: “The university is committed to respecting the privacy of individuals, including their interactions with others, and expects university members to esteem each other’s privacy and well being.”
c. Surveillance: “The university is guided by Fourth Amendment principles regarding surveillance of persons or places, whether in person on campus or electronically, and is committed to balancing the need for the safety of individuals and property with the individuals’ reasonable expectation of privacy in a particular location.”
a. Assume copyright protection: As stated in the UC Electronic Communications Policy (page 2):
“In accordance with federal law, users should assume that material created by others, in electronic or other form, is protected by copyright unless such material includes an explicit statement that it is not protected, or unless such material is clearly in the public domain.”
b. Avoid infringement: As stated in the UC Electronic Communications Policy (page 9, “Intellectual Property”):
“The contents of all electronic communications shall conform to laws and University policies regarding protection of intellectual property, including laws and policies regarding copyright, patents, and trademarks. When the content and distribution of an electronic communication would exceed fair use as defined by the federal Copyright Act of 1976, users of University electronic communications resources shall secure appropriate permission to distribute protected material in any form, including text, photographic images, audio, video, graphic illustrations and computer software.”
c. Avoid endorsement: As stated in the UC Electronic Communications Policy (page 7):
“Users of electronic communications resources must abide by university and campus policies regarding endorsements. References or pointers to any non-University entity contained in university electronic communications shall not imply university endorsement of the products or services of that entity.”
Social networking is built upon mutual trust. Attackers seek to exploit this trust relationship to damage reputation, disrupt operations, or for financial gain. Their tactics include taking control of social media sites and posting links to websites controlled by them to distribute malware or exploit vulnerabilities in web browsers, web browser extensions or applications.
a. Change your passwords often. As a precaution: use strong passphrases, avoid re-using passphrases for other sites, and where available use two-factor authentication.
b. Hover over links and look at statistics bar at the bottom of your browser to see where the link goes before clicking on it.
c. Install software patches within 48 hours.
d. Prepare an incident response plan to expeditiously identify, contain, eradicate, and recover from incidents.