All
All

Policy for Social Networking and Other Web-based Communications

216 KB | 3 files |  PDF, DOC

Create a social networking policy to assist you in keeping online communication on behalf of the organization in compliance with existing standards and applicable laws, as well as distinguish employees' personal online activities from professional communications.

The Sutter Health network believes that participation in online communities can promote better communication with the Sutter Health system's colleagues and customers, the general public, traditional and non-traditional media and other community stakeholders.

Sutter Health provides its official guidelines for social media participation to every employee, physician, volunteer, associate or affiliate of the Sutter Health network. These guidelines apply to anyone who creates or contributes to blogs, wikis, social networks, virtual worlds or any other kind of social media.

Use this policy as a guide to help you create your own social networking policy for your healthcare or other enterprise. It will assist in keeping online communication on behalf of the organization in compliance with existing standards and applicable laws, as well as distinguish employees' personal online activities from professional communications.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Policy for Social Networking and Other Web-based Communications.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Serving patients and their families in more than 100 Northern California cities and towns, Sutter Health doctors, not-for-profit hospitals and other health care service providers share resources and expertise to advance health care quality and access.

All IT Downloads from Sutter Health» | Visit Sutter Health »
Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....  More >>

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....  More >>

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data


Thanks for your registration, follow us on our social networks to keep up-to-date