Social Media Monitoring and Privacy Law
4.2 (117 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
4,028 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Social Media Monitoring and Privacy Law to your Wishlist.

Add to Wishlist

Social Media Monitoring and Privacy Law

Learn to monitor social networks without violating privacy rights in this course on lawful social media surveillance.
4.2 (117 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
4,028 students enrolled
Created by Eric Schwartzman
Last updated 1/2015
English
English [Auto-generated]
Price: Free
Includes:
  • 38 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Use social media to screen job applicants without making discriminatory hiring decisions
  • Monitor what employees and coworkers say on social media without violating privacy law
  • Lawfully access social media and personal email accounts with violating privacy rights
  • Track an employee's smartphones, tablet and computer use without violating privacy law
View Curriculum
Requirements
  • No prior knowledge of the legal aspects of social media monitoring is required.
Description

Just because you CAN monitor conversations on social media, doesn’t make it lawful.

If you monitor social media, this course could save you hundreds of thousands of dollars on attorney’s fee and damages.

Respect personal privacy rights when you monitor social media conversations and collect meta data.

Learn your right to monitor the use of any computers, smartphones and networks you own or sponsor, what the Electronic Communications Privacy Act requires, how the Fair Credit Reporting Act impacts job applicant screening and how to override social media password protection laws and gain access to personal social media and email accounts.

Who is the target audience?
  • This course is for anyone who conducts social media monitoring for work.
Compare to Other Social Media Management Courses
Curriculum For This Course
+
Intro to Social Media Monitoring and Privacy Law
2 Lectures 05:02

This course on social media and privacy for employers focuses on the digital surveillance rights of employers. The training covers which digital employee communications can be monitored, which are off limits, circumstances justifying broader employee surveillance, and the use of social media for job applicant screening.

Also included are primers on how the Electronic Communications Privacy Act of 1986 and Fair Credit Reporting Act (FCRA) protect employee privacy on social media.

The course includes case studies and examples and is accessible via the desktop and mobile devices. As you advance through the course, you will be given assessment questions. Your score will recorded and used to issue your Social Media Privacy certification.

Overview of Lawful Social Media Monitoring
03:03

This course provides insight into which digital employee communications they are and aren’t legally permitted to monitor.

But Comply Socially is NOT providing legal advice, determining “best practices,” or telling you what to say or do. The course is provided for informational purposes only.

One of the real values of social media is that it is less formal, more personal, spontaneous and real. Comply Socially is here to educate you so you can use social media in the ways that work for you.

There is no way for us to anticipate or discuss every situation that might arise. If you have a question on what to do, or how to handle something, talk to someone familiar with the legal and practical issues of your situation.

Different states, cities, and companies have different laws and rules that apply. If you're not sure, ask before you act.

What to Expect from this Course
01:59
+
Intro to Personal Privacy Rights
2 Lectures 08:03

This lecture explains the privacy rights of individuals which are generally recognized throughout the U.S. under common law and the factors considered in determining an unlawful invasion of privacy.

Understanding Personal Privacy
03:27

This lecture covers the main issue employers and managers face if they monitor their employees' digital communications, the privacy rights employees enjoy over their personal email and social media accounts, and what employers can and can’t monitor on computers and mobile devices.

Understanding Lawful Social Media Monitoring
04:36
+
Lawful Social Media Monitoring in Practice
6 Lectures 17:34

This lecture draws on legal precedent to explain why employers should think carefully before monitoring digital employee communications. It covers the sensitive issues surrounding monitoring how employees use personal email and social media accounts in the workplace.

Monitoring Personal Social Media Profiles
03:46

This lecture explains how hardware ownership impacts surveillance rights, laws concerning recording conversations, monitoring text and voicemail messages as well as cases when employers may be able to override legal personal privacy protections. Includes an overview of the Electronic Communications Privacy Act of 1986, the "business exception", and how the 4th Amendment applies to digital communications.

Monitoring PCs and Smartphones
03:14

This lecture covers the risks of using social media to screen job applicants, which include breaking laws that restrict employers from asking candidates to share social media usernames and passwords, opening yourself up to a discrimination claim and violating the Fair Credit Reporting Act.

Reference Link: http://www.blumenthal.senate.gov/newsroom/press/release/blumenthal-franken-call-on-social-intelligence-corp-to-clarify-privacy-practice

Job Applicant Screening and Background Checks
03:30

This lecture discusses exceptions under which employers could still request or secure access to an employee's personal social networking accounts.

Accessing Personal Social Media and Email Accounts
03:45

This lecture encourages managers to become familiar with state laws and employer policies that are specific to them. To review local state social media password laws, visit http://www.ncsl.org/issues-research/telecom/employer-access-to-social-media-passwords.aspx and http://www.ncsl.org/issues-research/telecom/employer-access-to-social-media-passwords-2013.aspx

Understanding Social Media Privacy Law
00:51

This lecture profile the social media password protection law in the state of Oregon. Whether or not you manage employees in the state of Oregon, to earn your Social Media Privacy for Managers Certificate you are still required watch this lecture and complete the assessment.

Shortcomings of Social Media Password Protection Laws
02:28
+
Risks of Unlawful Social Media Monitoring Practices
3 Lectures 07:02

This lecture examines three (3) specific instances where an employer could be able to justify a legal intrusion into an employee's personal email and social media profiles.

Surviellance Liability Review
03:09

This lecture recaps many of the important issues covered in this course.

Key Takeaways: Course Review
02:59

This lecture summarizes the personal responsibilities individuals have when they use social media at work.

Closing Statement: What You Learned from this Course
00:54
About the Instructor
Eric Schwartzman
4.2 Average rating
3,802 Reviews
54,361 Students
21 Courses
Multidisciplinary team leader

After 15+ years of marketing, public affairs and digital product management experience, I can lead multidisciplinary teams with the urgency of an entrepreneur, the sensitivity of a diplomat and the effectiveness of a scrum master.

I founded the first content management system for corporate communications, iPRSoftware (formerly iPressroom) before applying the merits of big data analytics to public affairs initiatives for the U.S. Dept. of State and DoD.  Currently, I lead digital innovation at a $1B industrial manufacturer responsible for critical infrastructure power equipment.

I'm also a digital product management, demand generation, search engine optimization, email marketing, and marketing automation expert with experience integrating and implements multiple platforms. 

In 2011, I cowrote the best-seller “Social Marketing to the Business Customer," the first book on B2B demand generation and created a portfolio of self-paced online courseware used by more than 36k students.