Laserfiche WebLink
comments from the public when they come across discussions about the Air Force on social <br />media sites,3 <br />6. Security <br />Governments are working to develop best practices to ensure the security of their data and <br />technical infrastructure in light of the new uses, users, and technologies related to social <br />media use, <br />Some of the reviewed policies deal explicitly with security concerns for social media, while <br />others are more general, For instance, the City of Hampton's policy simply points to <br />existing IT security policies by stating, "Where appropriate, City IT security policies shall <br />apply to all social networking sites and articles." Other policies target specific security <br />concerns; two types generally found in the policies analyzed and discussed in the <br />interviews were technical and behavioral concerns, <br />The technology concerns addressed in the policies focused on password security, <br />functionality, authentication of identity using public key infrastructures, and virus scans. <br />Fifteen of the policies included specific requirements such as requiring users to maintain <br />complex passwords, A few policies required a designated official to hold all username and <br />passwords for social media accounts. <br />Sample language outlining the technical concerns and processes to follow: <br />Agency 1T Administrators shall: <br />1, Limit Internet access Social Media web sites according to the agency's acceptable use policy, while <br />allowing authorized Users to reach content necessary to fulfill the business requirements, <br />Limitations may include:.,,, <br />b, Allowing Internet access to Users who are specifically authorized, <br />c, Preventing unnecessary functionality within Social Media web sites, such as instant <br />messaging (IM) or file exchange, <br />d. Minimizing and/or eliminating the addition of web links to other web sites, such as <br />"friends", to minimize the risk of exposing a government user to a link that leads to <br />inappropriate or unauthorized material, <br />2. Enable technical risk mitigation controls to the extent possible, These controls may include: <br />a. Filtering and monitoring of all Social Media web site content posted and/or viewed, <br />b, Scanning any and all files exchanged with the Social Media web sites, <br />State of California <br />The Department of the Navy memo on social media specifically mentions following the <br />Department of Defense's Public Key Infrastructure procedures and restricts the posting of <br />classified information to protected sites only. Two policies detail how attachments should <br />be scanned using antivirus tools before they can be posted on behalf of the government. <br />3 http://www,wired,com/imagesY,blogs/photos/uncategorized/2009/01./06/air„force,.blog,.char,ipg <br />10 <br />