Social Media Monitoring Now Being Used for Brand Threats and Loss Prevention

Now that 71% of online adults are using Facebook, it is more important now more than ever that businesses set up a social media monitoring strategy. Social media sites have the ability to boost exposure and profit for a company, but they can also cause major damage as well. This is where asset protection and risk management come in.

According to a 2009 Deloitte ethics and workplace survey, 74% of employed Americans surveyed believe it is easy to damage a brand’s reputation via sites such as Facebook, Twitter, and YouTube. Although that statistic may be frightening, it is possible for social media and areas like asset protection to have a beneficial relationship.

Consider the following tips for protecting your company and brand by using social media as a loss prevention tool.

  1. Assemble a team to closely monitor consumer feedback 24/7. Social media interaction doesn’t end when business hours do, and quick responses can avert a potential disaster. This team should also be responsible for investigating suspicious activity, such as theft, counterfeiting, and other crimes..

 

  1. Establish a response system when monitoring complaints online.The response system would provide specific protocols based on the nature of the complaint or issue, and from there, a response committee can address the issue. To be most effective, a response committee should consist of members from each department and a set process to follow on how to resolve and respond to a complaint or issue.
  2. Use social media monitoringas an investigative loss prevention tool.In a recent survey of active federal, state and local law enforcement officials, 81% said they use social media for investigative purposes, 67% percent indicated that social media is a valuable tool in anticipating crime, and 73% believe using social media can help solve crimes faster.

For example, a local sheriff’s office shared some security video images from a clothing boutique store that showed a female shoplifter stealing several hundred dollars in clothing. The boutique had a very good camera system and shared those images from their Facebook page to the Sheriff’s Office page, who in turn shared it with their followers. Within 30 minutes, the comment section was full of tips, eventually leading to the shoplifter’s identity. Without this platform, this crime may have gone unsolved, and that business would have taken a hit out of their own pockets.

 

Stolen property turning up for sale on Facebook buy and sell pages is also becoming increasingly common, police say. One of the key giveaways is price. Alarm bells should start ringing if a product that normally costs $1,000 is being offered for $100, such as jewelry or tools. If it’s too good to be true, it usually is.

  1. Report suspicious activity.Companies should establish an internal response system to report suspicious activity, such as retail crime, counterfeiting of goods, dissemination of proprietary information, and cyber-bullying of employees and/or supervisors on social media sites. The response system would consist of process on how to report suspicious activity via email and/or a phone line. You are responsible for finding the suspicious activity, so make sure your company knows how to use social media as a loss prevention tool and what to do with the information.
  2. Guard your information.With email still the biggest threat to leaking proprietary information, other modes of online communication are quickly catching up. According to Proofpoint, Inc., 17% of companies in the U.S. had confidential information exposed on social media sites like Facebook and LinkedIn in 2009. That figure is up from 12% in 2008.

By following blogs and message boards, monitoring YouTube videos, and keeping an eye on social networks, retailers can be aware of issues that arise and respond quickly instead of simply hoping that nothing comes up. Being a part of these social online communities is a risk, but it’s becoming a necessity as more businesses realize their potential. Just make sure your company is not vulnerable to hackers and the employees know what they can and cannot share.

  1. Manage feedback and build brand loyalty. Social media gives companies a chance to directly interact with their customers. Examining this feedback can assist you in looking at some of the ineffective operations of the business. When a company promptly responds to feedback, positive or negative, it builds brand loyalty. This also gives you the power to put out potential fires the minute they arise. As mentioned before, this is a 24/7 job for a 24/7 world.

Employees Are Also Using These Sites

It’s not just customers you should look out for: it’s employees, too. Many people think that when logging on to social media sites, they become anonymous. All too often, people lose their inhibitions when they realize they have the power to type anything they want without a face-to-face confrontation.

Employees need to realize they represent the company every time they contribute to social media sites. This is another reason corporate guidelines are useful for informing employees that, while they have a right to those sites, they also have a responsibility to uphold the image of the company. A disgruntled employee who logs on might do more damage than an angry customer.

In early March 2011, someone who had access to the official Chrysler Twitter account used vulgar language in a tweet. The tweet was deleted promptly, but Chrysler has over 7,000 followers, and it was re-tweeted immediately. The source of the tweet was Scott Bartosiewicz, an employee from the social media contractor for Chrysler. He was not a disgruntled employee, but he confused his personal account with the brand account—a mistake that cost him his job.

It took seconds for one tweet to tarnish this brand, but don’t let this prevent you from creating an account on Twitter. Chrysler had over 7,000 followers when this incident occurred. They now have over 188,000. Of course, it is unwise to pull an unprofessional stunt for the sake of attention, but it’s a reminder that it’s never the end of the world when it comes to social media. You can rebuild your brand by keeping a professional online reputation.

  1. Check out what your fellow employees are saying on social media sites. Some might say this is an invasion of privacy for the employees. They do have a right, but by posting statuses and pictures about their company or brand, they open themselves up to the public. It’s important to check out what the employees are saying because they could be discrediting the brand. While they have a right to their own opinions, they should keep a level of professionalism even out of the office on these sites.

Also, social media monitoring of employees can reveal theft…whether it’s time, office supplies, or larger products. If they tweet 20 times between 9:00 and 11:00 a.m. on a workday, it’s likely they are misusing company time. The reason many people share information online is because they think no one is watching. But if an employee is selling a printer on Facebook that looks like the one that just went missing around the office, it might be beneficial to start watching.

It may seem too “Big Brother” to keep such a close eye on employees’ social media behavior, but try to think of it as a better-safe-than-sorry technique.

How Can You Control Social Media Damage?

Manually scouring individual social media sites is a time-consuming process. Usually this is being done by individuals who are not formally trained in how to use social media data. One of the key advantages of using a purpose-built social media monitoring solution is that you not only get the tools, you get a dedicated team of people watching out for changes in the law and ensuring the system you’re using is in compliance.

A 2013 LexisNexis whitepaper entitled ‘How Social Media is Changing the Face of Investigations’ contains a passage which is true today as it was when it was initially authored:

“It is imperative that agencies are compliant with how they use information obtained via social media sites within their investigative process. Without clear guidelines, your agency is open to potential violations of 28 CFR Part 23. Tools like Social Media Monitor provide an archive function to preserve information gathered that is legally compliant and admissible in court. Social Media Monitor keeps an agency compliant with laws related to intelligence gathering and ensures that departments will be able to admit this evidence in court.”

Graham explained, “Well-trained personnel can play a huge part in crime prevention and discovering individuals who are planning to do wrong — both local gang members as well as domestic and international terrorists. Gathering a mountain of evidence from social media and being able to properly analyze it transforms raw information into ‘actionable intelligence’ and results in the effective deployment of valuable resources.”

 

About Us:

We have been mining social media since 2007 for our clients. By utilizing best in class software programs, we offer a service called eChatter.

eChatter works with you to obtain your objectives in a fast, accurate and reliable facet. By keeping our strengthened principals, yet evolving with this industry, we lead in social media monitoring. Since 2007, we have been dedicated to providing our customers with the most authentic data. Our eChatter services save you valuable time and money.

 

We offer:

·       Deep Web Scans

·       Jury Vetting

·       Jury Monitoring

·       Quick Scan

 

www.e-chatter.net

(866) 703-8238

 

The Use of Social Media Background Checks Rises among Employers

If you think that your Facebook and Twitter profiles won’t be looked at when you’re applying for a job, think again. The vast majority of employers are now searching through candidates’ social media accounts as part of the hiring process, new research finds.

A study from CareerBuilder revealed that 70 percent of employers now use social media to screen job candidates before hiring them, up from 60 percent a year ago. This also includes searches on Google, Yahoo and Bing,

But don’t let that stop you from posting online…and don’t delete your accounts altogether. That strategy could backfire! One-quarter of hiring managers expect candidates to have some sort of online presence, and nearly 60 percent are less likely to call someone in for interview if they can’t find them online.

“This shows the importance of cultivating a positive online persona,” Rosemary Haefner, chief human resources officer at CareerBuilder, said in a statement. “Job seekers should make their professional profiles visible online and ensure any information that could negatively impact their job search is made private or removed.”

Despite what you might think, most employers aren’t scouring the internet looking for reasons to not hire candidates. Most employers are actually trying to find reasons to hire someone.

The study found that 61 percent of employers conduct social screenings to look for information that supports a candidate’s qualifications for the job, 50 percent want to make sure the candidate has a professional online persona, and 37 percent want to see what other people are posting about the candidate. Just 24 percent of those surveyed check social media to search for reasons not to hire someone.

So what raises a red flag for employers?

The leading types of posts and behavior that left employers with a bad impression include:

  • Candidate posted provocative or inappropriate photographs, videos or information.
  • Candidate posted information about them drinking or using drugs.
  • Candidate had discriminatory comments related to race, gender, religion.
  • Candidate bad-mouthed their previous company or fellow employees.
  • Candidate lied about qualifications.
  • Candidate had poor communication skills.
  • Candidate was linked to criminal behavior.
  • Candidate shared confidential information from previous employers.
  • Candidate’s screen name was unprofessional.
  • Candidate lied about an absence.
  • Candidate posted too frequently.

Professionals shouldn’t ease up on ensuring their online presence is a positive once they land a job. The study found that 51 percent of employers use social networking sites to research current employees. Of those, 34 percent have found content that caused them to discipline, or even fire, an employee.

The need to hide or remove any inappropriate content should be obvious, but having a clean and private profile doesn’t demonstrate who you are, and may even suggest you have something to hide, said Laura Betourne, a social media specialist at Uproar PR.

“Employers with a strong company culture are looking at more than just your job experience,” Betourne told Business News Daily. “Use your personal accounts to convey your personality, and share your hobbies and favorite pastimes.”

Although this research has become a popular trend, social media vetting is a contentious issue in the HR community. Some argue that the practice is unethical and violates candidates’ right to privacy. HR execs who turn a blind eye to social media have argued that the views and opinions people express in their free time have no bearing on their ability to get the job done. Still, HR teams who turn to social media often feel the information and photos posted on these platforms is in the public domain, and it would be foolish not to use it.

 

Social Media Vetting: Pros and Cons

Pro: It can give greater insight into an applicant’s abilities
A resume is a very small window into a potential employee’s work experience and qualifications. Sites such as LinkedIn, Facebook and Twitter allow candidates a dynamic platform for exhibiting their work. Many journalists, photographers, and graphic designers share links to their clips on Facebook and Twitter, or specific portfolio sites like Behance and Contently.

Con: It could reveal protected information
Why do 80 percent of those surveyed avoid using social media to vet employees? A majority cite legal risk and the possibility of stumbling upon information that is usually protected including age, race and gender. Even when this information is obtained accidentally, if it has an impact on the ultimate hiring decision a candidate could argue discrimination.

Pro: It can reveal ugly incidents
Despite social media’s vast reach and public nature, candidates remain much more likely to be forthright in a tweet than they are in a job application or in-person interview. Social media sites are a good place to scan for potentially inappropriate behavior, such as overt acts of racism, sexism or other discriminatory behaviors. Hate speech can be a red flag for the HR team that a candidate might not fit into the organizational culture.

Con: It isn’t always reliable
In a world where Twitter accounts for brands like Burger King, Jeep and Fox News can get hacked, HR professionals can never be 100 percent certain that comments and content posted to a candidate’s page or wall is authentic. There’s always a potential for an HR professional to find an impostor account and mistake it for a valid one and the possibility of misconstruing pictures, messages or other information posted when this content is posted by someone with a similar name.

So who conducts Social Media Background Checks?

Social media vetting is time-consuming for hiring managers to do themselves. The American Bar Association recommends hiring a third-party vendor to conduct the social media searches. An added bonus: “Most helpful, a third party’s web-crawler system can typically review more webpages than an individual hiring manager tapping away at individual websites like Facebook and Twitter,” the ABA states.

The Bottom Line

It’s important to note that social media background checks make it easy for employers to find out information that can be held against you when you’re applying for jobs. Be cautious of what you post on social media, blogs, and other internet sites. The chances of someone finding information that could be damaging to your career are high. Your best bet is to be careful about what you post and to presume that what you post is public, despite any privacy settings you may have.

 

 

About Us:

We have been mining social media since 2007 for our clients. By utilizing best in class software programs, we offer a service called eChatter.

eChatter works with you to obtain your objectives in a fast, accurate and reliable facet. By keeping our strengthened principals, yet evolving with this industry, we lead in social media monitoring. Since 2007, we have been dedicated to providing our customers with the most authentic data.

 

 

We offer:

·       Deep Web Scans

·       Jury Vetting

·       Jury Monitoring

·       Quick Scan

·       Social Media Screenings

 

 

www.e-chatter.net

(866) 703-8238

 

The Hidden Meaning of Emojis

Those seemingly innocent emojis that we use daily…Did you know there is danger lurking behind them?

What can look harmless in a social media post or text message may have a different meaning to teens. The BBC Scotland recently aired a documentary on kids selling drugs online. An excerpt follows:

Teenagers are employing a code made up of ’emojis’ – small digital images normally used to convey emotions – to conceal the deals. One of the country’s largest drug gangs told a BBC documentary 75% of their takings now come through social media transactions, using ‘digital-savvy’ school pupils.

Film-maker Stacey Dooley confronted the young dealers, highlighting the ease with which illegal transactions can be arranged. One of them, 15-year-old ‘Denver’, was wearing his school uniform when he was filmed trying to sell her seven pills of MDMA, also known as ecstasy, at Maidstone railway station.

In the show, Stacey met Corey, from Glasgow, who said he’s been buying ecstasy since he was 12.

“It’s always been online for me,” he claimed, “It’s mainly through Snapchat and Instagram. You can get them in seconds straight to your door.”

“I think the draw to Snapchat is the fact that the messages aren’t permanent,” Corey observed. “You can speak to a larger amount of people and you can show it to people who are thinking about taking drugs.”

‘Digital’ Dealers

Using fake profiles on Instagram, Snapchat and the new ‘Tinder for Teens’ app Yellow, Stacey revealed how easy it is for children and young teens to get their hands on Class A drugs via seemingly unmoderated and unprotected social media platforms.

She was able to use emoji to ask for drugs and then arranged to meet and confront the ‘digital’ dealers.


What do you think? The more we know as parents and law enforcement professionals, the better. Social media is changing every day. 

 

 

 

 

 

Two Cases of Social Media Gone Wrong in Court

 

Social media content is being incorporated into trials across the world, and the legal system is still trying to determine how to best allow this, what’s legally able to be used as evidence, and other aspects of how social media is/can be used in court. As this is being hashed out, social media continues to impact the legal system in a variety of ways. The following two examples were recently noted in the news; one shows how a judge can be impacted by social media and the other shows how social media content can result in a mistrial.

Mistrial due to social media content

Last month, the Monitor published a story about a high profile, gang related trial that ended up being declared a mistrial. Why? A witness that had testified for over two hours and was given explicit instructions to not talk about the case did exactly that on social media only hours after testifying. According to the article, the witness admitted to posting articles and comments about her testimony after taking the stand, and a social media post she published stated that she had ingested Spice (synthetic marijuana) prior to testifying in court. Despite the witness claiming that she did not post this statement, it was allowed to be used in court and was considered in the decision to declare a mistrial.

This case is interesting in that it shows that what a witness or even juror posts can be used as evidence in court. However, there are methods that need to be used to appropriate capture and memorialize the content that a lawyer wishes to use as evidence – the “rules” are still murky but are being developed quickly across the country.

It also highlights the importance of monitoring social media during a trial, both for general content and for individuals involved in the trial, whether it is a juror or witness, to ensure that instructions are being followed to avoid situations such as the one above.

Judge are recused from case due to social media content

The Chicago Tribune published an article related to an Indiana case in which three judges have recused themselves, citing a potential conflict of interest from both attempted conversations on social media and phone calls, as well as visibility of social media content that may have been seen regarding the upcoming trial. One of the recused judges made a statement about her decision:

“Prior to the transfer of the above causes of action from Judge Julie Cantrell, this court overheard several attorneys discussing these cases in detail and saw several social media posts that create a conflict of interest.”

Another judge stated:

“Numerous uninvited ex-parte communications have occurred or been attempted through social media and telephone calls to influence this court,” Cantrell wrote in her order to transfer the case, saying the transfer was necessary to avoid the appearance of impropriety.”

The case has been assigned to a fourth judge, and as of this writing it is unclear whether that judge will hear the case.

This illustrates how social media can impact high profile cases, both from the stance of a judge being able to hear the case without possible conflict of interest as well as from the perspective of finding an impartial jury. Social media makes it much more difficult to find local residents who are completely impartial and have not read or heard about some high profile cases.