A business wants to start using social media to promote the company and to ensure that customers have a good experience with their products. Which security policies should the company have in place before implementation? (Choose two.)

A. All staff should be trained in the proper use of social media for the company.
B. Specific staff must be dedicated to act as social media representatives of the company.
C. Marketing professionals should write all senior staff blogs.
D. Review the security policy to ensure that social media policy is properly implemented.
E. IT staff should ensure that the company has sufficient bandwidth to allow for social media traffic.

B,D
Explanation: Before implementing social media for the company, the company should have the following security policies in place:
• Specific staff must be dedicated to act as social media representatives of the company.
• Review the security policy to ensure that social media policy is properly implemented.
All staff should not be trained in the proper use of social media for the company because all staff will NOT be responsible for posting on behalf of the company. It is not necessary for marketing staff to write all senior staff blogs. IT staff does not need to ensure that the company has sufficient bandwidth to allow for social media traffic because social media traffic should not significantly affect the network.

Computer Science & Information Technology

You might also like to view...

Identifiers in Java have ________ and ________ scopes?

a. method, class. b. class, block. c. block, statement. d. statement, file.

Computer Science & Information Technology

?Data stores are shown in a context diagram because data stores are external to the system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology