Briefing Statement to the CISO
This is to notify you that the company is going to implement a new social media policy. The new policy will affect our field office employees and managers. While it is crucial to engage our customers through the social media, we have to stay guided by best IT and ethical practices. Up to now, as you know, the field offices have had the autonomy in establishing and managing their independent social media accounts for marketing and communication purposes. Upon receipt of this communication, the head office will require you to supply it with login credentials of all social media accounts that your respective offices operate. It will enable us to have uniformity in communications to our customers and allow the company to put in place measures in line with a new IT governance strategy that will enable us to guard against data breaches and risks (Van Riel & Fombrun, 2007).
Though we cannot fully rule out the possibility of data breaches, it is important to familiarize ourselves with how they occur. It involves data being in unauthorized hands via theft, loss of company devices, hacking, leaks by internal people, and us not taking precaution to secure our data. If we become a victim of a data breach, we need to identify the source and notify the concerned people to form a response team then the relevant authorities. We will then proceed to inform our stakeholders, mostly the customers. After that, we will work to effect additional measures to secure data swiftly and, possibly, hire external help in addressing the issue as we go public and handle customer inquiries (Posey Garrison & Ncube, 2011).
Delegate your assignment to our experts and they will do the rest.
The new restrictions on your independent social media activities will help the company to stay prepared for such eventualities. The company, through your office, will communicate the new changes and policy. We shall shortly provide printed copies of the policies, email them to all employees, and put links to the company’s internal website. You will also offer face-to-face briefings to your juniors and other managers as is necessary (Welch & Jackson, 2007).
References
Posey Garrison, C., & Ncube, M. (2011). A longitudinal analysis of data breaches. Information Management & Computer Security , 19 (4), 216-230.
Van Riel, C. B., & Fombrun, C. J. (2007). Essentials of corporate communication: Implementing practices for effective reputation management . New York: Routledge.
Welch, M., & Jackson, P. R. (2007). Rethinking internal communication: a stakeholder approach. Corporate Communications: An International Journal , 12 (2), 177-198.