SOCIAL MEDIA GOOD PRACTICE BTC GUIDE LINES

SOCIAL MEDIA GOOD PRACTICE

These guidelines should be adhered to by all BTC students and instructors.

The following activities/behaviours are deemed unacceptable use or behaviour by the British Taekwondo Council members or Third Parties:

Publishing defamatory and/or knowingly false material about the British Taekwondo Council, BTC Member Organisations, their members, other Taekwondo groups, BTC colleagues and/or our customers on social networking sites, ‘blogs’ (online journals), ‘wikis’ and any online publishing format

Publishing comments or information that could be construed/interpreted as foul, profane language, sexist or racist, that condones the use of violence and verbal or physical abuse, that may be discriminatory on the basis of gender, ethnic origin, cultural background, age, sexual orientation, religion, political affiliation or ability about the British Taekwondo Council, BTC Member Organisations, their members, other Taekwon-do groups, BTC colleagues and/or our customers on social networking sites, ‘blogs’ (online journals), ‘wikis’ and any online publishing format

Publishing comments or information that are inappropriate for the audience/ intended user, for example on the basis of age or understanding as outlined in the BTC Safeguarding Policy

Revealing confidential information about the British Taekwondo Council, BTC Member Organisations, or BTC Administration in a personal online posting, upload or transmission – including financial information and information relating to our customers, business plans, policies, staff and/or internal discussionsFurther the following activities/behaviours are deemed unacceptable for individuals representing the British Taekwondo Council, BTC Member Organisations or their members as a whole:

Visiting internet sites that contain obscene, hateful, pornographic or otherwise illegal material

Using the computer to perpetrate any form of fraud, or software, film or music piracy

Using the internet to send offensive or harassing material to other users

Downloading commercial software or any copyrighted materials belonging to third parties, unless this download is covered or permitted under a commercial agreement or other such licence

Hacking into unauthorised areas

Undertaking deliberate activities that waste staff effort or networked resources

Introducing any form of malicious software into the corporate network

%d bloggers like this: