Social Networking: Managing the Risks and Realizing the Benefits
|
|
- Rudolf Hill
- 5 years ago
- Views:
Transcription
1 Social Networking: Managing the Risks and Realizing the Benefits 11 th Annual Compliance & Ethics Institute Las Vegas, NV Jim Donaldson, M.S., MPA, CHC, CISSP, CIPP/US Director of Compliance, Privacy and Security Officer Baptist Health Care Corporation Remember when it was simple? 1
2 Remember when it was simple? Remember when it was simple? 2
3 What s on the Agenda? Social Networking: What is it and why does it matter? What are the risks and benefits of social networking in the workplace? Establishing policy to address compliance and ethics concerns. The Building Blocks behind Social Media/Networking 3
4 Web 2.0 The term Web 2.0 is associated with web applications that facilitate interactive systemic biases, interoperability, usercentered design,[1] and developing the World Wide Web. A Web 2.0 site allows users to interact and collaborate with each other in a social media dialogue as consumers of usergenerated content in a virtual community, in contrast to websites where users (prosumers) are limited to the active viewing of content that they created and controlled. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, web applications, mashups and folksonomies. Source: Social Networking vs. Social Networking Services/Media Social Networking: A social network is a social structure made up of a set of actors (such as individuals or organizations) and the dyadic ties between these actors. Social Networking Service: A social networking service is an online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. In Just 7 Years Dual Processors at 1.5GHZ 32GB Memory 64GB Flash Storage 2 cameras (front/rear) Weight 5 ounces 1080p HD Video Recording Sensors: Accelerometer, digital compass, proximity, gyro, barometer Single Core Processor at 1.7GHZ 512MB Memory 60GB Hard Drive Weight 6.6lbs Battery Life 2.5 hours 4
5 Why it Matters Why it Matters 5
6 Technology Building Blocks: Electronic Mail or Method of exchanging digital messages and attachments over computer networks and/or the Internet. Currently, the most common method of business communications Extensive data movement capacity compared to other digital communication methods (GB/TB) Based on Store and Forward model. Utilizes mail servers. First used in days of ARPANET (1973) Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP) Text Messaging Short Messaging Service (SMS) Most widely used, Original texting technology Limited to 160 characters. - Remember Pagers? First SMS text message was sent over a wireless telephone network in (Just 20 Years ago) Significant vulnerabilities including weak or no encryption, store and forward technology, not encrypted at rest. Somewhat resilient 911, Katrina In many cases, texts went through while cellular traffic became unavailable. Highly susceptible to organized intercept and disruption efforts. Recent Example: EGYPT Syrian Conflict Pictures and videos of atrocities Text Messaging Multimedia Messaging Service (MMS) Expands on SMS and allows for multimedia content to and from mobile devices. As with SMS, MMS ties to web-based gateways and other services are common. Content adaption is a challenge because of differing capabilities of end user devices. This is flattening quickly and becoming less of an issue. 6
7 Text Messaging BlackBerry PIN Messing Service Similar to SMS and MMS but proprietary to Research in Motion Devices (RIM) BlackBerrys. Each RIM device has an 8 digit hexadecimal number that uniquely identifies the device. This is the PIN Advantage highly secure way to communicate between RIM devices. All communications are encrypted from transmission to receipt and on the device. Disadvantage proprietary to RIM and as of February, 2011, not compatible with iphones, Droids, etc. Instant Messaging - IM Similar to MMS/SMS and Immediate real-time communications between two or more people. Useful for alerts and status updates May not use store and forward. If recipient isn t logged into chat, message may be lost Location Based Services - LBS Information or entertainment service based on geographical information, latitude, longitude, (altitude, speed) Most SmartPhones have GPS and other positioning capabilities can acquire an accurate location simply from being turned on When connected to a social network, can be used by one person or many people Features in Facebook and other sites allow for automatic or manual checking in notifications and tracking If not managed, friends can out each other by checking them in. Emergency Department example. 7
8 Podcast Broad term-usually associated with non-streamed media, Audio and Video RSS Feeds can notify user of new content Allows users to pull media for local viewing/listening or save the content for future use Valuable training and education tool Blog Blend of the words web and log Website where a person or group of people maintain a regular commentary on a topic Visitors can leave messages and comments adding to the discussion Likely to have photos, video, etc. and links to other sites and information. Microblogging is a form of blogging differing from traditional blogging because the content is smaller in content and file size. 8
9 Location Based Services LBS FaceBook - Places Location Based Services LBS Google Latitude GeoTagging Process of adding geographical metadata to various media such as photographs, videos, websites, SMS messages Similar to Location Based Services First used with photographs Can provide location evidence to an accuracy of inches. 9
10 GeoTagging GeoTagged file Properties (metadata) Really Simple Syndication (RSS) Feeds Web feed formats used to frequently update information such as news, audio, video in a standardized format Documents or content is called a feed Allows users to subscribe to feeds and receive updates as they are pushed out Common RSS Feed Icon Really Simple Syndication (RSS) Feeds - JCAHO 10
11 Really Simple Syndication (RSS) Feeds - OIG Social Networking/Media It s COMPLICATED It s fun It s cheap and efficient It s fast It s not easy to control It s here to stay It is and will continue to shape history It will be heavily integrated into all industries including healthcare over time Developing Policy 11
12 National Labor Relations Act (Wagner Act) 1935 NLRB Memorandums on Social Media Cases Memorandum OM (August 2011) Memorandum OM (January 2012) Memorandum OM (May 2012) Protected Concerted Activity Protected Concerted Activity is a legal term used in labor policy to define employee protection against employer retaliation in the United States. It is a legal principle under the subject of the freedom of association. 12
13 National Labor Relations Act Sec. 7. [ 157.] Employees shall have the right to selforganization, to form, join, or assist labor organizations, to bargain collectively through representatives of their own choosing, and to engage in other concerted activities for the purpose of collective bargaining or other mutual aid or protection, and shall also have the right to refrain from any or all such activities except to the extent that such right may be affected by an agreement requiring membership in a labor organization as a condition of employment as authorized in section 8(a)(3) [section 158(a)(3) of this title]. NLRB Legality Test For workplace rules (Social Media Policy) Does it explicitly restricts section 7 protected activities? Would employees reasonably understand the language as prohibiting Section 7 activities? Was it implemented in response to union activity? Has it been applied to restrict Section 7 rights? Examples from NLRB Analysis 13
14 Examples from NLRB Analysis Examples from NLRB Analysis 14
15 15
16 Jim Donaldson, M.S., MPA, CISSP,CIPP/US Director of Compliance, Privacy and Security Officer Baptist Health Care Corporation
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A App See Application Application An application (sometimes known as an app ) is a computer program which allows the user to perform a specific
More informationLesson 2: Internet Communication
Lesson 2: Internet Communication Lesson 2 Objectives Define modern Web technologies Define social networking Define and use instant messaging and text messaging Use Windows Remote Assistance Discuss blogging
More informationWeb 2.0: Crowdsourcing:
Term 1 Definition 1 Web 2.0: A concept referring to the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities.
More informationMobile Devices. Objectives. Types of Devices 4/25/2012
Mobile Devices Objectives Identify mobile devices Learn how mobile devices obtain and transmit information Identify potential evidence that may be obtained from mobile devices Learn where data is stored
More informationMobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter
Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might
More information2014 SCCE Compliance & Ethics Institute. Session 506 Bring Your Own Device(BYOD)
2014 SCCE Compliance & Ethics Institute Tuesday, September 16, 2014 (11:00 12:00 AM) Session 506 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks,
More informationJim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida
2014 SCCE Compliance & Ethics Institute Tuesday, September 16, 2014 (11:00 12:00 AM) Session 506 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks,
More informationLibrary 2.0 for Librarians
Library 2.0 for Librarians Ina Smith & Christelle Steyn 31 January & 11 February 2008 1 Contents Google Mail E-mail Facebook Social Networking Tea break YouTube Upload Videos Flickr Upload Photos Blogger
More informationNOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section.
TITLE MOBILE WIRELESS DEVICES AND SERVICES SCOPE Provincial APPROVAL AUTHORITY Alberta Health Services Executive SPONSOR Information Technology PARENT DOCUMENT TITLE, TYPE AND NUMBER Not applicable DOCUMENT
More informationChapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts
E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson
More informationTITLE SOCIAL MEDIA AND COLLABORATION POLICY
DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the
More informationThe Internet and World Wide Web. Chapter4
The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History
More informationBlackBerry Bold 9650
BlackBerry Bold 9650 The only time a Tata phone won t be accessible. Please switch off your mobile phones during presentations. Be safe and help create a safe environment. Acquaint all on Safety. Take
More informationintroduction to using the connect community website november 16, 2010
introduction to using the connect community website november 16, 2010 getting started t How GoToWebinar works Use earbuds or speakers to hear the presentation audio Note that t webinar staff cannot hear
More informationComputer Technology. Lesson 2: Internet Communication
Computer Technology Lesson 2: Internet Communication Learning Goal: Students will be able to define modern Web technologies. Scale Yourself 4 I can define modern Web technologies. I can teach them to others.
More informationComputer Technology. Scale Yourself. Lesson 2: Internet Communication. Learning Goal: Students will be able to define modern Web technologies.
Computer Technology Lesson 2: Internet Communication Learning Goal: Students will be able to define modern Web technologies. Scale Yourself 4 I can define modern Web technologies. I can teach them to others.
More informationBlackBerry Messenger. Version 1.0. User Guide
BlackBerry Messenger Version 1.0 User Guide BlackBerry Messenger Version 1.0 User Guide Last modified: 21 June 2005 Part number: SWD_X_IM(EN)-001.001 At the time of publication, this documentation complies
More informationPrinciples of Information Systems textbook: Principles of Information Systems, Sixth Edition. Dr.Amer Alzaidi Department of Information Systems
+ Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition Dr.Amer Alzaidi Department of Information Systems Chapter 4 Telecommunications, the Internet, Intranets, and
More information6 Significant reasons to embark and establish a mobile VoIP business
6 Significant reasons to embark and establish a mobile VoIP business Whether you plan to enhance your current telecom infrastructure or start a completely new enterprise, enter the world of mobile VoIP
More informationivms-5260m Mobile Client User Manual (ios) UD06066B
ivms-5260m Mobile Client User Manual (ios) UD06066B User Manual COPYRIGHT 2017 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others, wordings,
More informationChapter 1 Living in a Network Centric World
Chapter 1 Living in a Network Centric World Introduction The globalization of the Internet has succeeded faster than anyone could have imagined. The manner in which social, commercial, political and personal
More informationWYNN SOCIAL CASINO PRIVACY POLICY
WYNN SOCIAL CASINO PRIVACY POLICY This privacy policy for the Wynn Slots App ( App ), made available by Wynn Social Gaming, LLC ( Wynn Social, Us, We, or Our ), describes our privacy practices (the "Privacy
More informationForms of communication in 21 st century. "Successful Communication-The future of Europe"
Forms of communication in 21 st century "Successful Communication-The future of Europe" Definition of Communication The roots of the word communication (communis, or common) accurately portray its purpose.
More informationPreFeed: Cloud-Based Content Prefetching of Feed Subscriptions for Mobile Users. Xiaofei Wang and Min Chen Speaker: 饒展榕
PreFeed: Cloud-Based Content Prefetching of Feed Subscriptions for Mobile Users Xiaofei Wang and Min Chen Speaker: 饒展榕 Outline INTRODUCTION RELATED WORK PREFEED FRAMEWORK SOCIAL RSS SHARING OPTIMIZATION
More informationChapter 002 The Internet, the Web, and Electronic Commerce
Chapter 002 The Internet, the Web, and Electronic Commerce Multiple Choice Questions 1. Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially
More informationEMBEDDED SYSTEMS AND MOBILE SYSTEMS
EMBEDDED SYSTEMS AND MOBILE SYSTEMS Embedded systems Sensors, actuators, devices 8-bit uc, sensors, actuators Mobile systems: Portable PC (powerfull, WiFi connected, heavy, cumbersome, about 4h of battery
More informationModule 1 Concepts of Information and Communication Technology (ICT)
Module 1 Concepts of Information and Communication Technology (ICT) The following is the Syllabus for Module 1, Concepts of Information and Communication Technology (ICT), which provides the basis for
More informationDiscovering Computers Chapter 2 The Internet and World Wide Web
Discovering Computers 2008 Chapter 2 The Internet and World Wide Web Just remember It took 38 years for radio to reach 50 million users 13 years for television to reach 50 million users Less than 4 years
More informationChapter 2 The Internet and World Wide Web
Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Explain how to access and connect to the Internet Explain how to view pages and search for information on the Web Describe the types of Web
More informationThe Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.
Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,
More informationDiscovering Computers Chapter 2 The Internet and World Wide Web
Discovering Computers 2009 Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet
More informationPANOPTO: Using Panopto in Canvas (Faculty)
PANOPTO: Using Panopto in Canvas (Faculty) Panopto is a service that allows you to record and store video and audio (podcast) recordings and link them to your Canvas courses. Panopto recordings and webcasts
More informationTechnology Policy! Tools, Tips, Apps
Technology Policy! Tools, Tips, Apps & How To Use Them in Extension Sonja Jo Serna ACES Information Technology Technology Policy Overview What is YOUR responsibility? Copyright Compliance Incidental Personal
More informationCITY OF DUBUQUE ADMINISTRATIVE POLICY REVISED OCTOBER 24, 2011 RETROACTIVE TO JANUARY 1, 2011
CITY OF DUBUQUE ADMINISTRATIVE POLICY POLICY NUMBER: 2. 13 SUBJECT: ACQUISITION AND USE OF CELLULAR TELEPHONE EQUIPMENT APPROVED BY: CITY MANAGER EFFECTIVE DATE: AUGUST 6, 1996 REVISED FEBRUARY 1, 2004
More informationivms-5200 Mobile Client User Manual (Android Phone) UD03186B
ivms-5200 Mobile Client User Manual (Android Phone) UD03186B User Manual COPYRIGHT 2016 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others,
More informationAndroid Samsung Galaxy S6 Edge
Android 6.0.1 Samsung Galaxy S6 Edge Access your quick menu by using two fingers to pull down the menu from the top-center of the screen. You can use this to quickly turn your Wi-Fi, Location, Bluetooth,
More informationPractice Examination 3
Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination
More informationCisco Open Platform for Safety and Security
Cisco Open Platform for Safety and Security 1 Agenda Market Overview Business Drivers Barriers and Risks Cisco Open Platform for Safety and Security Scenarios Ecosystem Partners Summary 2 Market Overview
More informationInternational Software Measurement & Analysis Conference Las Vegas, Nevada September 13, 2007
Life on the Edge: Counting Weird Things on the Web International Software Measurement & Analysis Conference Las Vegas, Nevada September 13, 2007 Thomas Cagley t.cagley@davidconsultinggroup.com (440) 668-5717
More informationHighlights. Main Features. Product Images: Mini Trooper 2-Camera Wire-Free Video Security System
Mini Trooper 2-Camera Wire-Free Video Security System 2 HD Wire-Free Indoor/Outdoor Cameras with Base Station and 8GB MicroSD Highlights Weatherproof with absolutely no wires so you can place it anywhere
More informationThe Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.
Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,
More informationChapter 2 The Internet and World Wide Web
Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet Recognize how Web pages
More informationQualcomm Technologies, Inc.
Qualcomm Technologies, Inc. Qualcomm, Snapdragon, Adreno and Uplinq are trademarks of Qualcomm Incorporated, registered in the United States and in other countries, used with permission. Qualcomm Snapdragon
More informationThe State of the Trust Gap in 2015
The State of the Trust Gap in 2015 The widespread use of mobile devices for work has driven a profound change in how employees think about the privacy of their personal data on mobile devices. Ten years
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationWASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information
WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington
More informationfacebook a guide to social networking for massage therapists
facebook a guide to social networking for massage therapists table of contents 2 3 5 6 7 9 10 13 15 get the facts first the importance of social media, facebook and the difference between different facebook
More informationIntroductory Visualizing Technology
Introductory Visualizing Technology Seventh Edition Chapter 6 Digital Devices and Multimedia Learning Objectives 6.1 Explain the Features of Digital Cameras 6.2 Compare Methods for Transferring Images
More informationAMCTHEATRES.COM - PRIVACY POLICY
Thank you for visiting AMCTheatres.com. AMC Entertainment Inc. values its relationship with guests, members and clients, and is committed to responsible information handling practices. This privacy policy
More informationThe New Xperia Tablet S from Sony: A Place for Your Imagination to Play
2 International Business Park #05-10 Tower One The Strategy Singapore 609930 Telephone: (65) 6544 8338 Facsimile: (65) 6544 8330 NEWS RELEASE: Immediate The New Xperia Tablet S from Sony: A Place for Your
More informationPart 1 of 3: Does Instant Messaging in the Workplace Increase Business Productivity?
Page 1 of 5 Get To Know Us (http://www.businessproductivity.com/about-us/) Get In Touch (http://www.businessproductivity.com/contact/) Cart (http://www.businessproductivity.com/store/cart/) Checkout (http://www.businessproductivity.com/store/checkout/)
More informationQUICK START GUIDE NTS HOSTED PBX CALL MANAGER. Welcome. Getting Oriented
QUICK START GUIDE NTS HOSTED PBX Welcome Welcome to NTS Hosted PBX! This guide is intended to get you up and running with the basic features associated with the product. For more in-depth information,
More informationFrequently Asked Questions
Frequently Asked Questions The GrandPad Member Services What is GrandPad? GrandPad is a simple and secure tablet computer that digitally connects a senior to their family and friends. The senior can easily
More informationETSY.COM - PRIVACY POLICY
At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,
More informationOutbound and Data Loss Prevention in Today s Enterprise
Outbound Email and Data Loss Prevention in Today s Enterprise Results from Proofpoint s seventh annual survey on outbound messaging and content security issues, fielded by Osterman Research during June
More informationCellular Site Simulator Usage and Privacy
Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and
More informationCisco Webex Messenger
Cisco Webex Messenger This describes the processing of personal data (or personal identifiable information) by Cisco Webex Messenger. 1. Overview of Cisco Webex Messenger Capabilities Cisco Webex Messenger
More informationWHAT IS GEOTAGGING GOOD FOR? HOW IT WORKS
WHAT IS GEOTAGGING GOOD FOR? Geotagging is the process of adding a location to your photos. It makes it easy to find exactly where you shot your images and it s also great for organizing your photos. The
More informationPD_BlackBerry_Folder_210x210mm_GB_4c_RZ_v4.indd :36
PD_BlackBerry_Folder_210x210mm_GB_4c_RZ_v4.indd 1 18.12.13 09:36 PD_BlackBerry_Folder_210x210mm_GB_4c_RZ_v4.indd 2 18.12.13 09:36 INTELLIGENCE MEETS SPEED THE P 9982 SMARTPHONE BY BLACKBERRY Porsche Design
More informationSleek And Sociable. The new BlackBerry Curve 9350 smartphone
Sleek And Sociable. The new BlackBerry Curve 9350 smartphone Staying social has never looked this cool, or been this easy. Sleek style meets simplicity with the new BlackBerry Curve 9350 smartphone. The
More informationHow to Select the Right Marketing Cloud Edition
How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire
More informationFundamentals of Information Systems, Seventh Edition
Fundamentals of Information Systems, Seventh Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets Fundamentals of Information Systems, Seventh Edition 1 An Overview of Telecommunications
More informationIntroduction. Topics of Discussion... Social Media Optimization (SMO) Applications and Challenges for Vocational Forensics
Social Media Optimization (SMO) Applications and Challenges for Vocational Forensics Presentation by Karen Moore and Sharon Shou American Board of Vocational Experts, 2012 Introduction The participant
More informationDietechnologies and Social Media for Nutrition Professionals. Evolving Personal Computers (PC) Evolving Personal Computers (PC)
Dietechnologies and Social Media for Nutrition Professionals Rick Hall, MS, RD Nutrition Program Arizona State University School of Nutrition and Health Promotion Evolving Personal Computers (PC) 1978-1982
More informationBlackBerry 7130e Version 4.1. User Guide
BlackBerry 7130e Version 4.1 User Guide BlackBerry 7130e Model Number: RAV20CW Last modified: 9 December 2005 Part number: SWD_X_HH(EN)-069.003 At the time of publication, this documentation is based on
More informationDSRC Interchange Details
DSRC Interchange Details P. Roka, May 1, 2011 This document explains data exchange between DSRC modules. DSRC modules are herein referred to as hardware and software enabled with wireless connectivity
More informationBuilt to keep you moving
B L A C K B E R R Y Z 1 0: R A I S I N G T H E B A R F O R B U S I N E S S BlackBerry 10 is an entirely new mobile computing platform that removes many of the barriers that slow down other devices. Here
More informationTechnology Brown Bag: Web 2.0
Technology Brown Bag: Web 2.0 Schedule information Event Technology Brown Bag: Web 2.0 When Thursday, May 4, 2006 from 12:00pm to 1:30pm Where Harris 1300 Event details Details Access Contact What is Web
More informationAirplane mode Android app application Back key bandwidth
1G First-generation analog wireless telephone technology. 2G Second-generation wireless technology, the first digital generation and the first to include data services. 3G Third-generation wireless telephone
More informationHow does it work? Typically, a content provider publishes a feed link on its site, which end users subscribe to using a news feed
ATA Oct07-SF.qxd 10/18/07 7:41 PM Page 32 RSS Feeds: Your Information on Your Terms By Michael Wahlster If you are like most people, you visit several websites regularly. You might seek out professional
More informationLocation based Mobile Multimedia Pusher System
Location based Mobile Multimedia Pusher System Amit Chaurasia 1, Yash Chaurasia 2, Vishal Gupta 3, Ashwani Singh 4, Vaishali Malpe 5 1,2,3,4B. Tech, Department of Computer Science, Terna Engineering College,
More informationIGLOO AND SNOWBALL. Philippe Garnier Ecosystem program
IGLOO AND SNOWBALL Philippe Garnier Ecosystem program DISCLAIMER Copyright ST-Ericsson 2011. All rights reserved. The contents of this document are subject to change without prior notice. ST-Ericsson makes
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationThe Connected Worker and the Enterprise of Things
The Connected Worker and the Enterprise of Things Todd Berger Sr. Director Technical Solutions January 2018 2007 2 Apple iphone 2017 BlackBerry. All Rights Reserved. 2 2017 Apple iphone X 2017 BlackBerry.
More informationMobile Internet Devices and the Cloud
Mobile Internet Devices and the Cloud What Is a Smartphone? Mobile Operating Systems for Smartphones 1. iphone 2. Google (Android) 3. Blackberry 4. Windows Mobile 5. Ubuntu Mobile Internet Device (MID)
More informationACCEPTABLE USE OF HCHD INTERNET AND SYSTEM
Page Number: 1 of 6 TITLE: PURPOSE: ACCEPTABLE USE OF HCHD INTERNET AND EMAIL SYSTEM To establish the guidelines for the use of the Harris County Hospital District s Internet and email system. POLICY STATEMENT:
More informationCorporate Communication Solutions for the Dynamic Enterprise
Corporate Communication Solutions for the Dynamic Enterprise 10 Key Selling Points for IP Communication Solutions February 2009 Alcatel-Lucent All Rights Reserved Alcatel-Lucent 2009 Achieve an innovative
More informationChapter 7. Telecommunications, the Internet, and Wireless Technology
Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different
More informationApp Description Tips Download
YouTube App Description Tips Download A video app that allows users to view, share, discuss, and upload videos. You can create an account so that YouTube will remember your preferences. You can also subscribe
More informationCRM Insights. User s Guide
CRM Insights User s Guide Copyright This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
More informationDonor Credit Card Security Policy
Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry
More informationStart Here BlackBerry Curve 9300 Series
Welcome to BlackBerry! Get to know your new BlackBerry Curve smartphone. Explore the keys 2010 Research In Motion Limited. All rights reserved. BlackBerry, RIM, Research In Motion, SureType, SurePress
More informationInnovation, inspiration and focus of public health information portals. Nicholas Cop -
Innovation, inspiration and focus of public health information portals Nicholas Cop - copn@bellsouth.net Health information delivery Consolidation Indexing for searching Interoperability Health Professionals:
More informationGoogle Hangout Lin Zhong
Tutorial on Google Hangout, Fall, 2012. 1 Page Google Hangout Lin Zhong This tutorial will demonstrate how to make video chat with more than one people at once and how to share screen and video with group
More information1/13/2011. Using the Four C s of Social Networking. QR Code Handout Slides
Using the Four C s of Social Networking to Help You and Your Program Housekeeping Session Materials: http://musicedmajor.net/fmea10/socialnetworking QR Code Handout Slides Embedded Presentation Audio Recording
More informationBeam Technologies Inc. Privacy Policy
Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,
More informationAmerican Public Health Association s Affiliate Online Community User s Guide. October 2015 edition
American Public Health Association s Affiliate Online Community User s Guide October 2015 edition TABLE OF CONTENTS Getting Started- Creating Your Account.3 Getting Started- Tips and Suggestions.4 Getting
More informationBlackBerry Bold 9780 Smartphone Version: 6.0. User Guide. To find the latest user guides, visit
BlackBerry Bold 9780 Smartphone Version: 6.0 User Guide To find the latest user guides, visit www.blackberry.com/docs/smartphones. SWDT643442-941426-0922024829-001 Contents Quick Help... 9 Top 10... 9
More informationCreated by Eugene Stephens ios 8.2
ios 8.2 Physical Buttons - Sleep / Wake Used to turn the device on /off or wake / sleep. Located on the top, right corner (iphone 6 located on right side). - Ring / Silent Used to turn off the ringer.
More informationNPR.ORG - PRIVACY POLICY
Effective Date February 06, 2013 See related: NPR Terms of Use At NPR, we recognize the importance of privacy to visitors of NPR.org, NPR's mobile sites and applications, NPR's interactive voice response
More informationDevelopment And Management
Development And Management Native and Instant Applications (PWA) Functionality List for 2017/2018 Around Us The Around Us feature is a great way to display relevant points of interest within your app,
More informationActive Sync Devices: Procedures and Policies
Active Sync Configuration: ipad Active Sync Devices: Procedures and Policies November 2010-1 - Active Sync Configuration: TABLE OF CONTENTS Activation Procedures 3 Security Policy: Overview 3 Active Sync
More informationMicrosoft Yammer Users Guide
2017 Microsoft Yammer Users Guide This guide will assist you with using Microsoft Yammer. INFORMATION TECHNOLOGY SERVICES ITS TRAINING Table of Contents What is Yammer?... 2 Access... 2 Navigating Yammer...
More informationAutomatic information protection when device camera is operated by secondary user
Technical Disclosure Commons Defensive Publications Series November 14, 2017 Automatic information protection when device camera is operated by secondary user Matthew Sharifi Jakob Foerster Follow this
More informationApril 18, 2014 P a g e 1
Release Information... 3 New Functionality... 3 1. Overview... 5 2. Install AT&T Toggle Voice... 6 Requirements... 6 3. Sign in to AT&T Toggle Voice... 7 4. Enter your Location for Emergency Calls... 9
More informationApp for a Smartphone or Tablet Terminal EXILIM Connect 3.0
App for a Smartphone or Tablet Terminal EXILIM Connect 3.0 User s Guide EN This manual uses a typical CASIO camera and smartphone for explanations. Certain details (display contents, etc.) may differ on
More informationDispatcher (ICMC) User Guide
Dispatcher (ICMC) User Guide TABLE OF CONTENTS 1 INTRODUCTION... 4 1.1 OVERVIEW... 4 1.2 AUDIENCE... 4 1.3 KEY FEATURES... 4 2 INSTALLATION... 5 2.1 SYSTEM REQUIREMENTS... 5 2.2 FIREWALL REQUIREMENTS...
More informationBUILT FOR BUSINESS. 10 Reasons BlackBerry Smartphones Are Still the Best Way to Do Business. Whitepaper
1 BUILT FOR BUSINESS 10 Reasons BlackBerry Smartphones Are Still the Best Way to Do Business Whitepaper 2 10 Reasons BlackBerry Smartphones Are Still the Best Way to Do Business It doesn t matter what
More informationPrivacy Policy- ADDO Worldwide LLC LAST UPDATED: September 9, 2014
Privacy Policy- ADDO Worldwide LLC LAST UPDATED: September 9, 2014 1. Introduction Chick-fil-A Leader Academy is owned and operated by ADDO Worldwide, LLC ( ADDO Worldwide, LLC, we, us, our ). We at ADDO
More informationPresented by: Therese Mickelson, ABC!
Presented by: Therese Mickelson, ABC! ! Evolution of Web Web 2.0! Online conversations! Online networks! New journalism! Expect / Demand interaction ! Social Media the tools! Social Networking what you
More information