article thumbnail

8 Social Listening Examples: How Brands Are Thriving Digital Landscape

Keyhole.co

It then used some of these stories to create campaign posters which were distributed online and on billboards in the towns where each featured story came from. Compliance and security Compliance and data privacy are a top concern for marketers when collecting information about customers to inform their strategy.

article thumbnail

Six Links Worthy Of Your Attention #165

Twist Image

"When the Snowden affair broke, it occurred to me that there would be a huge new market for secure, encrypted Internet communication services; where users would pay for privacy. The results are impressive and it looks a whole lot better than a poster or print. I couldn''t stop thinking about this story. Scary smart.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

So You Just Graduated and You Want a Job

Social Media Strategery

DON’T forget to make use of the privacy settings on these sites. Thanks again for publishing such great reading material!! Thanks again for publishing such great reading material!! Thanks again for publishing such great reading material!! is, But They Do Need to Experience It Six Villains of Gov 2.0 The Whole. :

Gov 2.0 80
article thumbnail

The complete crisis management guide for marketing leaders

Sprout Social

In October 2023, a hacker breached 23andMe’s database and stole information about millions of customers and threatened to publish the leaked data. Your crisis management team can use this information to respond to posters quickly inside the Smart Inbox before these complaints turn into a larger problem.

article thumbnail

How to Stitch on TikTok: Examples + Tips

Hootsuite

If you don’t see the Stitch option, that means the original poster has disabled Stitch for their video. In your settings, select Settings and Privacy. Next, click Privacy. Once you’ve selected the video, click the three dots in the bottom right, then choose Privacy Settings. Try it free today. Try it free!

Examples 105
article thumbnail

Gov 2.0: Taking a Look Back at 2009 | Social Media Strategery

Social Media Strategery

Tech President published the Federal Web Managers’ Council paper on barriers to social media at Christmas last year. The practioners in federal agencies have policies, have developed relationships and agreements with security and privacy professionals and are answering the hard questions that some are just starting to ask.

Gov 2.0 120
article thumbnail

What Makes Government 2.0 Different from Enterprise 2.0? | Social.

Social Media Strategery

name (required)email (will not be published) (required)url [.] James I think another important consideration for using social tools on government sites is the limitations imposed by Privacy and Accessibility rules. Certainly rings a few familiar bells for me. link] sradick @Susan – thanks for the comment!

Gov 2.0 76