Pages

Wednesday, October 6, 2010

IBM's Use of Social Media Inside the Firewall

View Comments
So Friday, was a busy day for sure. On Monday, I told you how I had to be up at 7am to record episode 20 of the This Week In Lotus podcast. At lunch time, I headed over to the El Conquistador resort to speak at a panel on Internal Communications for the Association of Professional Public Relations of Puerto Rico.

The panel was 1 hour long and I only had 15 minutes to talk about how IBM is using social media inside of the firewall. The idea was that the other speaker would get another 15 minutes and then we would use the other 30 minutes to field questions from the public and/or the moderator.

Since I only had 15 minutes, I created this quick presentation which of course doesn't do justice to all the great things that IBM is doing, but should serve as a teaser.



I volunteered to go first and noticed a lot of people taking notes (and almost no one live tweeting). After my 15 minutes were up, I sat down and anxiously waited for the Q&A part of the panel. However, the other speaker stood up for 55 minutes.

Because we were limited on time, we only had a chance to answer 1 question from the public and it was about guidelines. The other speaker mentioned that his company doesn't have a social media policy.

I, of course, mentioned that IBM has a set of Social Media Guidelines and that they are available for others to model after it. In fact, Mashable recommends that you create your social media guidelines by copying those from IBM. And it turns out that the keynote speaker for the conference was Deirdre Breakenridge who is a big fan of IBM's work and even mentioned it while she was here.

The moderator was also able to get one question in and it was related to how IBM takes action when an employee does something wrong like accidentally publish confidential information. This is a common "fear" as highlighted in the book The New Social Learning (which I need to dedicate a full blog post to). I spoke about how our community mostly self-polices each other and that there are people out there watching out just in case and we have a formal structure to take action in case something happens (which I won't go into detail here). I also mentioned the advice from the book, "educate people on how to use [the tools] effectively for work".

So I know it's a short presentation, but I promised to post it here for others to reference it later on.
blog comments powered by Disqus