Date post: | 27-Dec-2015 |
Category: |
Documents |
Upload: | liliana-gallagher |
View: | 216 times |
Download: | 1 times |
Social Media
Impact on
EmploymentOctober 2, 2013
Human Resource Services
What is so
cial
media
?
Any online service used to communicate
with others or display images.
FACEBOOKFACEBOOK
TWITTERPINTEREST
Soci
al M
edia
M
yths
My settings are secure and
others can’t see my information if I have not
allowed them to.” FALSE
What I do on social media is
my personal business and
my employer cannot
interfere in my personal
online persona.” FALSE
If I have deleted an image,
then it is gone forever.”
FALSE What I say on social media is
a protected first amendment
right.” FALSE
Talking with
your friends
over dinner is
like footprints
in the sand.
What is th
e d
iffere
nce
betw
een ta
lking w
ith frie
nds
and p
ostin
g o
n so
cial
media
?
Talking with
your friends
over social
media is like
footprints in
concrete.
Polic
y G
uid
ance
and
Dis
tric
t Requir
em
ents
Educator Code of Ethics can be located
on the LISD website in
Board Policy DH (Exhibit), Employee Handbook pages 42-44
Employee Handbookcan be located on the
intranet through HR Forms and Documents
Polic
y G
uid
ance
and
Dis
tric
t Requir
em
ents
Educator Code of Ethics: The Texas educator shall comply
with standard practices
and ethical conduct toward students, professional colleagues,
school officials, parents,
and members of the
community and shall
safeguard academic
freedom.
Polic
y G
uid
ance
and
Dis
tric
t Requir
em
ents
Educator Code of Ethics:
The Texas educator, in
maintaining the dignity
of the profession, shall
respect and obey the
law, demonstrate personal integrity, and
exemplify honesty.
Polic
y G
uid
ance
and
Dis
tric
t Requir
em
ents
Educator Code of Ethics:
Standard 2.2. The educator shall not
harm others by knowingly making false
statements about a colleague or the school
system.
Polic
y G
uid
ance
and
Dis
tric
t Requir
em
ents
Educator Code of Ethics:
Standard 3.8. The educator shall maintain appropriate
professional educator-
student relationships
and boundaries based
on a reasonably prudent
educator standard.
Polic
y G
uid
ance
and
Dis
tric
t Requir
em
ents
Educator Code of Ethics:
Standard 3.9. The educator shall refrain
from inappropriate communication with a
student or minor, including,
but not limited to, electronic
communication such as cell
phone, text messaging, e-
mail, instant messaging,
blogging, or other social
network communication.
Polic
y G
uid
ance
and
Dis
tric
t Requir
em
ents
Educator Code of Ethics:
Standard 3.9. The educator shall refrain
from inappropriate communication with a
student or minor, including,
but not limited to, electronic
communication such as cell
phone, text messaging, e-
mail, instant messaging,
blogging, or other social
network communication.
Polic
y G
uid
ance
and
Dis
tric
t Requir
em
ents
Employee Handbook If an employee wishes to use
a social network site or
similar media for personal
purposes, the employee is
responsible for the content
on the employee’s page,
including content added by
the employee, the employee’s friends, or
members of the public who
can access the employee’s
page, and for Web links on
the employee’s page.” page
47
Polic
y G
uid
ance
and
Dis
tric
t Requir
em
ents
Employee HandbookAs role models for the
district’s students, employees are responsible for their public conduct even
when they are not acting as district employees.” page 47
What is my belief of what
is private or public on social media sites?
.
Can I b
e d
isci
plin
ed
or
fire
d f
or
my
soci
al
media
post
ing?
Teacher who was asked to resign based on a Facebook
Comment.
How do I protect myself on social media?
Tips to help you be aware and protect yourself.
Identi
ty T
heft
A 2011 Javelin report
found longtime social
networking users were
almost twice as likely
as those newer to social networking to
become victims of ID
theft.”
Identi
ty T
heft
Users post their full name
including maiden name.
Users post their birthdate.
Users post the month and
day of the birthday, but
not the year.Users post the year they
graduated from high
school or college.Users post their
hometown.
Telli
ng p
eople
when
you a
ren’t
hom
e
If you have location services
set up on your phone for
social media sites, thieves
are able to know when you
are not at home.Posting vacation photos or
comments about vacations.
Tagging when you arrive at
a location. If you tag
yourself often, thieves can
predict your patterns.
Many applications on your
cell phone list your location
when you comment or post
something.
Frie
ndin
g p
are
nts
of
your
students
or
students
them
selv
es
When you friend parents of
district students, all comments are considered
public.It is highly discouraged to
friend the parents of
students in the district.
Photos, comments, and
sexual orientation status is
copied and sent to district
officials on a daily basis
from employee social
media sites.
Secu
rity
Sett
ings
Set your security on social
media sites to the most
restrictive access from
outside sources.REMEMBER: Just because
your settings are set to the
highest security does not
mean that your information or photos are
secure. The settings of
your friends can cause
your information to be
shared with others.
Main
tain
a
Profe
ssio
nal I
mage
Always remember that
your comments are a
direct representation of
your district, campus, and
profession. No matter
when the comment if
made or who it is directed
at.Always assume that your
posts or pictures will be
shown at a P.T.A. meeting
on the big screen in the
cafeteria.
When do I need to have separate
professional and personal accounts?Things to Consider
What
do y
ou
typic
ally
post
?
If you post photos of
yourself in social settings
involving alcohol , then
have separate accounts.
If you are tagged in pictures or LIKE pictures or
videos that can be considered unprofessional,
then have separate accounts.If people post
inappropriate language on
your social media, then
have separate accounts.
What
do y
ou
typic
ally
post
?
If you utilize your social
media as a form of professional communication
or promotion, have separate
accounts.If you post religious or
political comments, then
have separate accounts.
ALWAYS REMEMBER: When
you have separate accounts,
you do not need to friend or
LIKE your professional
account. You should know
what you are doing on a day
to day basis.
What
happened t
o
Freedom
of
Speech
? If you are making negative comments about your supervisor
or employer, then your
comments are not protected by the First
Amendment Freedom
of Speech.
What
happened t
o
Freedom
of
Speech
?
If your comments, photos,
or any activity, school-
connected or otherwise,
that, because of publicity
given it, or knowledge of
it among students, faculty, and community,
impairs or diminishes the
employee’s effectiveness
in the District, the employee can be disciplined or recommended for non-
renewal or termination.
Yours
elf It is recommended
that you Google yourself several times
a year to see what information appears.
Search images of your
name in Google.
Photo
s and T
ags
If a picture is posted
online and you tag someone, a box shows up
around their face. This
picture is now available
to the public and is saved
on a Google Website.Once you’ve been tagged
in it, it is saved forever.
Even if you untag yourself, it remains out in
cyberspace forever.
Sex
ting
A dramatic increase in
sexting has occurred
with individuals between the ages of
35 – 55. Depending on the method used, those pictures or comments
may be available to others.
Protect yourself and
don’t put yourself in a potential situation.
What questions do you have about social media?