Do Agency Social Media Policies Need Tweaking?

mouseThe Department of Defense held a poll for its employees regarding which social media sites they use most frequently. The top three in order of favorites were Facebook, coming in at 84.6%, Email at 79.5%, and YouTube at 51.9%. Coming in next after the top three sites were LinkedIn, Twitter, and iGoogle.

Another recent survey by Human Capital Institute and Saba found that Defense Department employees are more likely to use social networking tools than employees in civilian agencies.

In NextGov reports, Jim Gill, the VP of public sector business at Saba, said “Agencies realize that as more workers from Generation X and the millennial generation [are recruited], they expect certain technology in the workforce to do their job.“

Deloitte also recently came out with a survey on social media. They found that social networking has become so important to teenagers that they would base whether or not they take a job based on if they can access these sites from work.

The Deloitte survey found that 88% of teenagers use social networking sites on a daily basis. However, according to NextGov, “More and more employers, including the federal government, have implemented policies that limit or ban employee access to social networks during the workday.”

These policies do not seem to be moving in the same direction as the next generation of employees, or even to the current employees that find social networking so essential. If an agency has a social networking policy that is not favorable, this could turn potential employees away. Will these policies shift to match these statistics?

You may also be interested in...

David McKeown

David McKeown: DOD Eyes Creation of Zero-Trust-Focused Portfolio Office

David McKeown, the Department of Defense's (DOD) equivalent of a chief information security officer, said DOD is looking to establish a portfolio management office that specializes in zero-trust cybersecurity. The office's creation would help DOD centralize and manage efforts to implement a zero-trust architecture, which strictly imposes requirements before one is able to access the defense network.

Leave a Reply

Your email address will not be published. Required fields are marked *