Social Media protocols and procedures
Purpose
The purpose of this document is to outline the engagement protocols and procedures for AUSTRAC’s official
social media activity.
In applying these protocols and procedures, people should also be mindful of:
IT Security policy obligations
Complementary guidelines for AUSTRAC’s people wishing to publish content through social media in a
personal or unofficial capacity
National Archives of Australia guidelines on social media record management.
Background
The term
social media encompasses a number of tools that blend online technology and social interaction. Social
media platforms provide opportunities for people to generate, share and exchange information in virtual
communities and networks. Social media is also commonly referred to as Web 2.0.
Like other communication tools, these contribute to information dissemination as well as reputation management
by working in complement with other communication channels. The use of social media is to be undertaken as
part of a broader communication plan, which includes consideration of timing and the range of communication
conduits used. Stakeholder Relations (particularly through Communications and Products) will take primary
Act
responsibility for developing communication planning.
Social media are distinguished from traditional or mass media channels because
social media are interactive, conversational communication conduits rather than one-way modes
FOI
social media platforms enable anyone to become a publisher, as opposed to a few major organisations
which own telecast, broadcast or print media outlets
social media are real-time, immediate and frequent forms of publishing, without technical production
the
lead-times
the readers of social media are visible and identifiable – in that participants need to set up accounts in
2015
order to take part – and their points of view are visible
access is by personal computers and mobile devices such smart phones and tablets.
under
Social media is now widely accepted and used in the broader community. Increasingly, the public expect
May
organisations to provide a forum which:
broadcasts information about the organisation and its activities, publications and information
12
provides a way for the public to respond and engage
is succinct and prompt in its response.
Released
Government context
These protocols have been developed with reference to the following:
the government’s
e-government and the digital economy policy and
Digital Government agenda Australian Public Service Commission (APSC) Circular 2012/1
Revisions to the Commission’s guidance
on making public comment and participating online
It is expected that Australian Government organisations will strive to listen to stakeholders and be responsive and
approachable while maintaining the apolitical nature of the Australian Public Service (APS).
The APSC Circular (listed above) cites the APS Values and Codes of Conduct and these apply when using social
media in the same way as when APS employees participate in any other public forum. The requirements include:
behaving with respect and courtesy, and without harassment
dealing appropriately with information, recognising that some information needs to remain confidential
delivering services fairly, effectively, impartially and courteously to the Australian public
being sensitive to the diversity of the Australian public
taking reasonable steps to avoid conflicts of interest
AUSTRAC Social Media Protocols & Procedures; March 2015
EDRMS # 930761
P a g e |
1
Page 1 of 13 pages
making proper use of Commonwealth resources
upholding the APS Values, Employment Principles and the integrity and good reputation of the agency
and the APS
not acting in a way that would call into question the APS employee’s ability to be apolitical, impartial and
professional in the performance of their duties
Using Social Media
The objectives of AUSTRAC’s official social media channels are to raise awareness, inform, engage, communicate
with and learn from stakeholders and the Australian community. AUSTRAC will utilise two key social media
channels. Others will be considered in due course, as opportunities suggest and resourcing allows.
Twitter
Raise awareness of AUSTRAC’s identity and areas of interest/operation
Distribute links to media releases and other news, announcements, activities, event notices and updates
Highlight and promote AUSTRAC activities, publications and other web-site content
Address enquiries received via the channel
Demonstrate connection with partner agencies and other stakeholders
Facebook
Raise awareness of AUSTRAC’s identity and areas of interest/operation
Act
Distribute media releases and other news, announcements, activities, event notices and updates
Highlight and promote AUSTRAC activities
Address enquiries received via the channel
FOI
Objective
Activity
Social media channel
the
1. Awareness
Identify and follow partner agencies, industry
Twitter
Raise awareness of the agency
associations and others of relevance to
Facebook
2015
and its purpose
AUSTRAC’s brand, areas of expertise and
mandate. under
Post content linked to our areas of expertise and
mandate. Re-tweet and share content, which is
May
associated with our purpose, from partner agencies.
2. Inform
Post content and messages based on pre-approved
Twitter
12
Distribute publicly-available
material (e.g. from media releases, publications,
Facebook
information, in line with
existing web content).
AUSTRAC’s communication
Co-ordinate timing and message consistency
Released
objectives
through Stakeholder Relations in liaison with
relevant work areas.
3. Engage
Identify social media accounts for stakeholders
Twitter
Building relationships with key
Where appropriate, ‘follow’ stakeholder accounts
Facebook
stakeholders or target audiences
Re-tweet and share content, which is associated
online
with our purpose, from partner agencies.
Where appropriate strive to engage community
members in a two-way conversation.
Ensure that re-directs and responses are delivered
promptly, especially if correcting inaccuracies or
concerns.
AUSTRAC Social Media Protocols & Procedures; March 2015
EDRMS # 930761
P a g e |
2
Page 2 of 13 pages
In due course, other social media channels can be assessed as appropriate. Each would be subject to the
appropriate approvals prior to being activated. These could include:
YouTube
Provides information in accessible video formats online
All video clips require captioning
Linked-In
A social media channel which can contribute to recruitment processes
Target audiences
Primary audiences
Stakeholders include those with an interest in, or a link to, AUSTRAC’s strategic priorities and activities, such as
partner agencies, industry associations, reporting entities.
Secondary audiences
Members of the Australian community
Attorney-General’s Department and central agencies
Act
Mass media outlets and journalists who are conduits to reaching the Australian community
Specialist media outlets that are conduits to the financial, compliance, risk management, national security,
law enforcement and government policy sectors
FOI
FATF membership
Unintended audiences
the
It is noted that, like all communications in the public domain, social media communications can reach audiences
beyond those originally intended by AUSTRAC. It is accepted that organised crime groups, terrorist support
2015
groups and others are active in social media channels.
under
Developing a following
May
It is essential to develop a strong cohort of people/organisations following the social media channel. The value of
a social media channel is driven by the size and breadth of the following.
12
This can be developed through the following practices:
Sending follow requests to identified organisations and individuals with whom AUSTRAC has a
relationship and shared interests.
Released
The expectation, as a social media courtesy, is that they will then follow in return. Accepting those follow
requests is straightforward.
As the network of followers expands, so does the pool of potential followers for AUSTRAC.
Unsolicited requests to follow will be assessed on a case-by-case basis by reviewing the profile of the
requester.
Branding
All social media accounts are subject to AUSTRAC’s visual style guides. For advice and information on branding
and the visual style guides, please review the guides on
OnTrac.
AUSTRAC Social Media Protocols & Procedures; March 2015
EDRMS # 930761
P a g e |
3
Page 3 of 13 pages
Moderation
Authority
The person/s responsible for posting material on the official AUSTRAC social media channels will be authorised
by the CEO. The nominated person will have the authority to post on the official AUSTRAC social media
channels with oversight by their line manager.
In certain special circumstances, such as when an election is called and the Caretaker Conventions are evoked,
AUSTRAC staff will notify the Executive regarding:
any comments on social media that may require a response
any postings on social media channels.
This will help to ensure that AUSTRAC’s engagement, particularly during this time, will not be misconstrued as
political comment.
Moderated accounts
All of AUSTRAC’s social media accounts are moderated. This means that the sites are monitored for user-
generated content and action taken where appropriate as set out below.
The nature of social media encourages discussion and engagement. The nature of AUSTRAC’s work can lend
itself to a broad range of perspectives and opinions.
The sites are monitored for content that might infringe privacy, impinge on security, disclose information of a
threatening or harmful nature or is offensive, obscene, abusive, racist, sexist, homophobic, ageist, unrelated to the
Act
topic at hand, illegal or otherwise unhelpful to respectful and constructive dialogue.
FOI
Moderation procedure
1. The post will be hidden from public view, with notification provided to the user as a comment to their
post.
the
2. This process should also be used when content is posted that discloses personal information about that
user or anyone else.
2015
3. Continual posts of inappropriate material will result in a post from the page as follows:
“We’ve had to remove some posts from our wall that breach our moderation guidelines.”
under
4. Posts where there is a threat or disclosure about the safety and wellbeing of a person require an immediate
response. The situations for such posts cover the following:
May
Threat or disclosure of an act of terrorism
12
Dob-ins
In all of these circumstances, the moderator will respond as follows:
Released
1. Urge the user to contact 000 if there is any immediate danger or if a serious incident has just occurred
2. Urge the user to contact the National Security Hotline 1800 1234 00 if the threat relates to an act of
terrorism
3. Re-direct the user to the AUSTRAC Contact Centre if the matter relates to a dob-in or less immediate
danger, and notify the Contact Centre of the contact received via social media.
4. All public posts in relation to these exchanges should be removed as soon as practicable, and after
advising the user concerned where possible.
Monitoring and responses
Monitoring
AUSTRAC’s official social media accounts will be monitored by a moderator in Communications and Products,
on behalf of Stakeholder Relations, at 9.00am, 12.30pm and 3.00pm each business day.
AUSTRAC staff who regularly use social media are encouraged to notify Communications and Products by email
if an urgent or important matter involving AUSTRAC is identified at other times. All AUSTRAC staff are
AUSTRAC Social Media Protocols & Procedures; March 2015
EDRMS # 930761
P a g e |
4
Page 4 of 13 pages
reminded that they are not to engage in the conversation on behalf of AUSTRAC. This can only be done through
the official AUSTRAC channel.
Responses
It is not essential to respond to every tweet or post. A few key considerations for assessing a post or tweet for a
response include:
is it directly related to our mandate
is it accurate and/or positive about AUSTRAC
is it a direct question (eg from an RE).
The flow diagrams, below, provide a decision frameworks for response types and for dealing with negative or off-
topic posts or tweets.
Social media response framework
Is the comment/post appropriate, inaccurate, low risk or high risk?
Appropriate
Inaccurate
Low risk
High risk
Act
Do we want to respond?
Post contains inaccurate
Post contains:
Post contains:
Post contains inaccurate
• We agree
information about:
• Some inflammatory
• Violent, abusive or
• Let post stand as is
• AIFS
information about
statements
threatening comments
FOI
• Provide additional info
• Proj
e
A ct
USTRAC
• Political comments
• Hateful statements
• Provide positive review or
• Eve
n
E tvent
• Comments that promote
• Private information
appreciation
• Pa rti
P c
a irpta
icnts
ipants
personal or professional
• Discriminatory statements
• Stakeholders
interests
• Defamatory statements
the
Stakeholders
• Certain off-topic remarks
• Certain off-topic remarks
Multiple posts of same view
2015
Approved person responds
• Develop response
• Document the incident
• Document the incident
• Clear response
• Delete/hide comment
• Advise work area
under
• Approved person responds
• Advise person who posted
• Delete comment
• Consider banning
May
Use your judgement!
12
Released
AUSTRAC Social Media Protocols & Procedures; March 2015
EDRMS # 930761
P a g e |
5
Page 5 of 13 pages
Dealing with off-topic or negative comments
Are they a troll?
Is it a legitimate statement?
It's off-topic but …
It's off-topic but …
Is it someone who posts
Is the statement critical or
• it's part of a discussion that's
• it's part of an orchestrated
inflammatory, extraneous or
negative but may be correct or
mostly on-topic
campaign
off-topic measures in an online
doesn't breach the terms of use
• you think they or the
• it's been raised multiple
community, with the primary
of the page?
community wil get back on-
times in multiple posts
intent of provoking readers into
topic
• it breaches the terms of use
an emotional response or of
• the person is trying to
otherwise disrupting normal
contribute positively
on-topic discussion?
Don't feed the trol s!
• Leave the comment
• Leave the comment
Treat as low or high risk
Treat as low or high risk
• Monitor
• Monitor
• If inaccurate, low risk or high
• Raise awareness of terms of
risk, use the framework to
use, if appropriate
determine the best approach
Use your judgement!
Act
Style of expression
The content of messages, to be communicated via social media channels, will vary according to the nature and
purpose of the communication. Posts will be factual and unclassified. Some key principles of language for the
social media context are:
FOI
a conversational tone is appropriate, while being mindful that the communication is emanating from an
Australian Government body
the
clear, concise language, using active voice is recommended
effusive or emotional language should be avoided.
2015
Stakeholder Relations (particularly through Communications and Products) will assist with suggested wording.
under
Use existing content
May
Where possible, responses to enquiries will be developed from publicly available information and direct the
follower to the website or other publicly available source. Existing content in the public domain, such as on the
12
website, is a valuable source of material.
A set of standard responses to common enquiries will be developed and maintained.
Some posts/tweets might best be handled by re-directing enquiries, such as an RE query might be re-directed to the
Released
Contact Centre.
Experience from other agencies indicates that it can be expected that 80% of the responses will be from pre-
approved material while 20% will require a specifically developed response.
Developing a response
Where a specifically developed response is required, they will be handled in a similar way to approvals for
publications, media relations, etc:
responses developed with the relevant work unit
cleared through Executive.
Due to the nature of social media, it is important to process these responses swiftly, in line with the following
procedure:
1. The moderator of the social media account notes a post/tweet that requires a specifically developed
response:
a. notes the time of posting and receipt
AUSTRAC Social Media Protocols & Procedures; March 2015
EDRMS # 930761
P a g e |
6
Page 6 of 13 pages
b. acknowledges the receipt of the enquiry and undertakes to source an answer (e.g. “Interesting
question. I’ll look into it for you.”)
2. The moderator contacts the relevant work unit to advise of the enquiry and works with the work unit to
develop a draft response of the factual details in appropriate language tone and style.
3. The draft response is cleared with the relevant General Manager, then Executive General Manager, who
will decide whether the CEO’s clearance is also needed. This decision will form the basis of attribution for
the response.
4. When approved, the moderator posts the response on the social media platform where the issue was found,
and notes the time.
a. Responses to social media enquiries should be swift. The time between the moderator receiving
the enquiry and posting the final response should be no longer than two hours.
5. The moderator must make a record of the interaction in the official AUSTRAC record keeping system
(enquiry, approvals, response and timings) to ensure records and statistics of all social media interactions
are recorded.
a. This is in line with whole of Government requirements to create and manage accurate records of
business activities so that decisions and actions can be accounted for; which includes the use of
social media in an official capacity.
Act
Evaluation
FOI
Communications and Products will conduct an evaluation of AUSTRAC official social media activity regularly to:
monitor the uptake of the AUSTRAC social media activity among the primary and secondary target
audiences
the
monitor the nature of activity generated by AUSTRAC and followers
identify any trends emerging from the activity
2015
evaluate the tone of behaviour on the various social media platforms
under
compare AUSTRAC activity against the performance and experience of other agencies and learn from
their use, including through involvement in the Cross Agency Social Media forum.
May
12
Released
AUSTRAC Social Media Protocols & Procedures; March 2015
EDRMS # 930761
P a g e |
7
Page 7 of 13 pages
Page 1 of 4
Internet access information
This page contains information on accessing the internet from AUSTRAC computers,
supplementing the IT Security Policy [/node/1939/] and other documents.
Internet sites now outrank email as the most likely source of a computer virus or similar
malicious software, and some pose significant threats to individual online privacy.
AUSTRAC filters internet access in line with our policy and information security
obligations.
Act
Websites that display a policy reminder
Some websites are not completely blocked, but display a policy reminder when you try
FOI
to access them. These are websites or categories that AUSTRAC considers are
potentially unrelated to your work.
the
2015
under
May
12
Released
This is intended to remind you about reasonable and appropriate use of the internet in
line with AUSTRAC policy. Read on below for explanation and examples to guide you
on internet use.
The notification gives you three options:
1. Clicking the
More Information button brings you to the intranet page you are
reading now.
2. Click the
Continue button if your use of the website is in line with policy. The
website will then open as usual.
Page 8 of 13 pages
Page 2 of 4
3. Click the
Go Back button if you do not need to visit the site. For example, you may
choose to access the site later from your home computer instead.
Websites that are blocked
If you attempt to access a website blocked by AUSTRAC, you will see this:
Act
FOI
The
More Information button links to this intranet page. The
Go Back button returns
the
you to your previous page. If you need to access a blocked site, contact the IT Service
Desk to discuss the possible options.
2015
Some categories blocked by AUSTRAC include:
under
• Malicious websites, which contain or link to code that
May
may intentionally modify our
computers without consent and to cause harm
• Counterfeit business sites aiming to eliciting financial or
12
other private information
from you
• Sites containing graphic adult content unsuitable for our workplace
• Sites that promote or support online gambling, illicit
Released
drugs, or criminal activity
• Sites that provide public webmail and similar online messaging services
• Sites that enable peer to peer file sharing and transfer
• Sites whose primary function is to provide freeware and software downloads.
AUSTRAC blocks these websites to reduce exposure to a range of risks. Blocked
categories and individual sites are reviewed from time to time, and may change in
response to factors such as AUSTRAC policy or new online threats. If you identify a
website that should be blocked, but isn't, please alert the IT Service Desk
[mailto:xxxxxxxxxxxxx@xxxxxxx.xxx.xx].
Appropriate and professional use of internet access
All AUSTRAC staff (employees and contractors) are required to undertake their
business and work relations in a professional and responsible manner. This is essential
to protect AUSTRAC's professional image and the integrity of the information we hold.
Page 9 of 13 pages
Page 3 of 4
The Australian Public Service (APS) Values and Code of Conduct set the standards of
behaviour expected of public servants. Contractors, while not public servants, are also
required (through their contracts) to adhere to these standards. Several elements of the
Code of Conduct are particularly relevant to the appropriate and professional use of
internet and emails:
• behaving with respect and courtesy, and without harassment
• making proper use of Commonwealth resources
• taking reasonable steps to avoid conflicts of interest
• at all times upholding the APS Values and the integrity and good reputation of the
APS.
What does AUSTRAC expect?
Internet and email facilities are official resources provided by AUSTRAC to enable staff
to carry out AUSTRAC business. In using these resources, AUSTRAC expects that:
• the information technology databases and systems, the internet and email will be
used for official work purposes with limited personal useAct
• access to information is on a 'need to know' basis
• the security and integrity of the system and information will not be compromised,
FOI
for example not observing password protocols and transmitting personal
information without authorisation.
the
What is limited personal use? 2015
AUSTRAC allows for staff to use the internet and email for personal use in limited
under
circumstances. These may include internet banking and account payments or short,
general information searches. It may also involve contact with colleagues and members
May
of the public by email that is not work related. Any personal use:
12
• must not interfere with normal business activities (this includes both volume and
content of private messages)
• must not have the potential to embarrass AUSTRAC, the APS or the government
Released
• must not involve accessing inappropriate websites
• must not contain defamatory, offensive or harassing material
• must always maintain a professional tone
• must not be a means of bullying or causing distress or a sense of exclusion.
Some examples of inappropriate personal use include:
• frequent use of a social networking website throughout the day
• frequent visits to entertainment or sports websites
• extended or frequent periods of participation in a community discussion forum
• browsing websites idly without a specific purpose related to AUSTRAC work
• using your AUSTRAC email address to join or subscribe to online services that are
not directly related to your work at AUSTRAC.
Does AUSTRAC monitor internet and email usage?
All internet activity and email traffic is logged, and those logs are retained under the
Page 10 of 13 pages
Page 4 of 4
relevant legislation and regulations.
AUSTRAC routinely monitors access and usage, and this is a condition of using
AUSTRAC computers. Monitoring is typically done for performance planning,
troubleshooting, or security reasons. Periodic reports on internet and email use patterns
are provided to management.
If there is reason to suspect misuse, an investigation may be conducted to determine
whether there may have been a breach of the APS Code of Conduct or policy
obligations. Breaches of IT, information management, protective security
or personnel policies may result in loss or downgrade of security clearance, sanctions
imposed under the APS Code of Conduct or in some cases criminal charges.
Where can I go for more information?
Questions about internet access can be directed via general request to the IT Service
Desk [https://itservicedesk.hq.austrac.gov.au/HEAT] (call x0008 if urgent). Questions about IT
Security policies should be directed to the IT Security AdvisorAct
[mailto:xxxxxxx.xxxxxxx@xxxxxxx.xxx.xx].
Alternatively, you may wish to speak to your manager, the Agency Security Advisor or
the Director, Employment Conditions and Services.
FOI
This page is maintained by the IT Security Advisor [/users/wshipway] and feedback is
the
welcome [mailto:xxxxxxx.xxxxxxx@xxxxxxx.xxx.xx].
2015
Related information
under
Please be mindful of IT Security Policy when accessing the internet.
May
• APS Values and Code of Conduct [http://www.apsc.gov.au/aps-employment-policy-and-advice/aps-
12
values-and-code-of-conduct]- including guidance for making public comment and
particpating online
• AUSTRAC IT Security media watch [http://ontrac/blog?
Released
term_node_tid_depth=130&created_1=&created=]
• Social Networking: Privacy and Safety [/node/3306/]- an IT Security quick reference
guide
• Stay Smart Online [http://www.staysmartonline.gov.au/]- protect yourself
• CyberSmart [http://www.cybersmart.gov.au/]- advice for parents, teens and kids
Page 11 of 13 pages
Page 1 of 2
Social networking: privacy and safety
AUSTRAC computers and internet access are Commonwealth resources, to be used for
work purposes in line with our policies. However, AUSTRAC staff and contractors may
choose to use social networking tools in their own time using their own resources. This
sheet provides privacy and safety advice.
Your relationship with AUSTRAC
Any personal or professional use of social media by AUSTRAC staff and contractors
Act
must not bring AUSTRAC into disrepute, imply AUSTRAC endorsement of personal
views, compromise effectiveness at work, or disclose official information. If a site
requires your employer, list Australian Government in preference to AUST
FOI
RAC, due to
the sensitivity of our work and the dangers of becoming the focus of undesirable
attention.
the
Guard your personal information and reputation
2015
under
Social networking sites like Facebook require you to submit personal information about
yourself, and sometimes about other people. These sites may have options to control
May
the information you share with others, and options to manage interaction with other
people. Be very selective with what information you put online, how you share it, and
12
who you accept as a ‘friend’.
Some people use social networking sites to threaten, harass or embarrass others.
Criminals actively use these sites to access personal information and steal identities.
Released
Criminals also use personal information for other illegal activities in the real word, and
you can be unknowingly targeted or implicated.
Protective steps for social network sites
The following page lists important steps that can help protect you, your family, and your
friends. These steps also protect your colleagues, your work at AUSTRAC and the
sensitive information we are required to safeguard.
• Always type your social networking website address into your browser or use a
bookmark. Links shown in emails or on websites can be very easily manipulated,
sending you to malicious sites. Forged emails are common.
• Use a different password for each social networking site. When one password is
leaked (it will happen), your other accounts should be safe.
• Protect your accounts with strong passwords, and enable extra account protection
if offered. Eg enable an SMS token or authentication app.
Page 12 of 13 pages
Page 2 of 2
• Set your online profile to ‘private’ and be very discerning about who you accept as
your ‘friend’. If you haven’t met in person, you don’t really know them. Online
identities can also be faked very easily.
• Think before you post – expect many people other than your friends will see what
you put online, now and years in the future. It’s virtually impossible to remove
content completely, once it is available online.
• Don’t post information that would make you or your family vulnerable, such as date
of birth, home address, the detail of your daily routine, child’s school, or holiday
plans. Yes, burglars do know how to use the internet.
• Don’t post photos or details of family, friends or colleagues that may be
inappropriate, or that they haven’t agreed to being posted. Turn on Facebook’s
review option, to approve others ‘tagging’ you in their photos.
• Be alert to suspicious links and out-of-character messages or posts. Even if
received from your friends, they may have had their account hijacked.
• Familiarise yourself with scamwatch.gov.au and common types of fraud. The
internet and social media are regularly used for scams.
• Avoid using social networking from public or shared computers. Even if you log
out, keystrokes or personal details may have been captured.
Act
Where can you go for help?
FOI
Concerned about:
Contact:
the
Harassment or bullying
See the ThinkUKnow [http://www.thinkuknow.org.au/site/] and
2015
online, or someone who is Cybersmart [http://www.cybersmart.gov.au/] sites for advice, or
at risk?
contact the AUSTRAC PSS team
under
May
Fraudulent use of your
Your social network provider, and if appropriate, your local
12
identity or other criminal
police or CrimeStoppers on 1800 333 000
activity?
Released
Your online security at
AUSTRAC IT Help Desk, or AUSTRAC IT Security Adviser
work?
[mailto:xxxx@xxxxxxx.xxx.xx]
AUSTRAC Protective Security
Your personal safety?
[http://ontrac/security-and-
emergency/security/protective-security-2071]
Page 13 of 13 pages