Policy development is a core competency required of Chief Information Security Officers. In order to develop policy, however, it is necessary that the CISO and other business leaders understand the underlying issues and, where technology is involved, they must also understand those issues as well.
Read this article: https://www.bigcommerce.com/blog/social-media-advertising/#the-6-best-social-networks-for-ecommerce-advertising
Choose one of the social media platforms listed in the article above and research its privacy policy. Then prepare an “expert opinion” paper for the senior leaders in your organization. (If you cannot find the privacy policy for a given social media platform, choose a different platform.)
For your opinion paper, you must
perform additional research and then write your informed opinion as to the privacy issues that exist or may exist for that platform
identify specific privacy issues which could adversely affect Padgett-Beale
identify any additional issues with that platform which could adversely affect Padgett-Beale’s cybersecurity posture
answer the following questions in your paper
What do you think about your selected platform’s approach to privacy?
How would the platform’s privacy policy impact an organization that is contemplating using the platform for advertising and marketing?
Which of the social media services provided by the platform would you allow Padgett-Beale’s marketing department to use?
Should Padgett-Beale’s employees in general be permitted to use the platform during the work day (using company networks and/or IT resources). What risks are involved with permitting such usage?
what type of policy would you recommend that Padgett-Beale adopt to govern the organization’s use of social media platforms for marketing and other forms of internal and external communications?
Post your 5 to 7 paragraph “expert opinion” Please use only website references (not journals or book) from 2019-2021. You need to cite at least 4 references regarding your work. Please be sure to format your paper as follows:
Introduction
Analysis
Summary
References