Guidelines for Participation in Online Communities

242 KB | 3 files | null PDF,null DOC

Quality is always an issue with content, even on social media networks such a s Facebook and Twitter. These guidelines will help ensure that your team is representing your brand in a positive light.

Sutter Health provides its official guidelines for social media participation to every employee, physician, volunteer, associate or affiliate of the Sutter Health network. These guidelines apply to anyone who creates or contributes to blogs, wikis, social networks, virtual worlds or any other kind of social media.

Included are rules for:

  • Interacting online as a representative of the organization
  • Protecting patient health information and confidentiality
  • Creating quality content

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Guidelines for Participation in Online Communities.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Serving patients and their families in more than 100 Northern California cities and towns, Sutter Health doctors, not-for-profit hospitals and other health care service providers share resources and expertise to advance health care quality and access.

All IT Downloads from Sutter Health» | Visit Sutter Health »
Related IT Downloads

social media community manager job description Job Description: Social Media Community Manager

Hire the right candidate for handling your social media activities by creating a job description that captures essential duties, experience, skills and education. ...  More >>

Social Media Opportunity Assessment Tool Social Media Opportunity Assessment Tool

The assessment tool identifies three growth opportunities: sales, marketing and customer service....  More >>

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.