LinkedIn has published a new user agreement document which explicitly shows that sexual services are not allowed on the LinkedIn network.
The social network said that they never allowed sexual services before but now they have implemented the rule in their user agreement document.
LinkedIn went for the new user agreement because they noticed that in some countries like The Netherlands it is legal to provide/promote sexual services.
LinkedIn said that users are not allowed to:
In general, policy is a plan or course of action a business intends to influence, determine decisions, actions and other matters and an architecture is the art and science of designing and building something. A cybersecurity policy architecture is the cornerstone of an effective business strategy. Specifically, a cybersecurity policy architecture is the foundation of an enterprise protecting assets, a combination of administrative, technical, and physical protection.
At the Cyber Security 2011 event this question came up. Do you have a social media protocol in your company? And does the protocol achieve its goal? How do you monitor it? What are the legal aspects?
Social Media Protocol
This protocol is for the use of Merton Council staff, and aims to help them make responsible decisions and get the most out of social media tools. We have published this on the website because we have received a number of requests from other organisations wishing to read it.
Speaker: William Winsborough · George Mason University
Basing authorization on attributes of the resource requester provides flexibility and scalability that is essential in the context of large distributed systems. Logic programming provides an convenient, expressive, and well-understood framework in which to work with authorization policy.