Laserfiche WebLink
comments from the public when they cone across discussions about the Air Force on social <br />media sites .3 <br />6. Security <br />Governments are working to develop best practices to ensure the security of their data and <br />technical infrastructure in light of the new uses, users, and technologies related to social <br />media use. <br />Some of the reviewed policies deal explicitly with security concerns for social media, while <br />others are more general. For instance, the City of Hampton's policy simply points to <br />existing IT security policies by stating, "Where appropriate, City IT security policies shall <br />apply to all social networking sites and articles." Other policies target specific security <br />concerns; two types generally found in the policies analyzed and discussed in the <br />interviews were technical and behavioral concerns. <br />The technology concerns addressed in the policies focused on password security, <br />functionality, authentication of identity using public key infrastructures, and virus scans. <br />Fifteen of the policies included specific requirements such as requiring users to maintain <br />complex passwords. A few policies required a designated official to hold all username and <br />passwords for social media accounts. <br />Sample language outlining the technical concerns and processes to follow: <br />Agency IT Administrators shall: <br />1. Limit Internet access Social Media web sites according to the agency's acceptable use policy, while <br />allowing authorized Users to reach content necessary to fulfill the business requirements. <br />Limitations may include:.... <br />b. Allowing Internet access to Users who are specifically authorized. <br />c, Preventing unnecessary functionality within Social Media web sites, such as instant <br />messaging (IM) or file exchange. <br />d. Minimizing and /or eliminating the addition of web links to other web sites, such as <br />"friends ", to minimize the risk of exposing a government user to a link that leads to <br />inappropriate or unauthorized material. <br />2. Enable technical risk mitigation controls to the extent possible. These controls may include: <br />a. Filtering and monitoring of all Social Media web site content posted and /or viewed. <br />b. Scanning any and all files exchanged with the Social Media web sites. <br />State of California <br />The Department of the Navy memo on social media specifically mentions following the <br />Department of Defense's Public Key Infrastructure procedures and restricts the posting of <br />classified information to protected sites only. Two policies detail how attachments should <br />be scanned using anti -virus tooth before they can be posted on behalf of the government. <br />3 ht tp: / /www.wired.com /images_blogs /photos /uncategofized /2009 /01/06 /air_ orce_blog_char.jpg <br />10 <br />79 <br />