Condescending Corporate Communication How to stop talking down to people.

Slides:



Advertisements
Similar presentations
Guideposts --Quality Work-Based Learning Programs
Advertisements

The Role of One-Stop Career Centers and People with Disabilities Elena Varney, M.S., C.R.C. National Center on Workforce & Disability/Adult
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
Indiana State University Assessment of General Education Objectives Using Indicators From National Survey of Student Engagement (NSSE)
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Data Ownership Responsibilities & Procedures
1 6 - Outsourcing Outsourcing. © Robert G Parker – UW-CISA 2010 Dealing with issues when a portion or all of the provision of technology services is performed.
Environmental Management Systems An Overview With Practical Applications.
Security Controls – What Works
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Developing information for participants in your research - Writing your participant information This presentation will help you to create the first draft.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
School-Community Relations. Learning Outcomes (School-Community Relations) Students are able to: Students are able to: Explain the meaning of meaningful.
Examine Quality Assurance/Quality Control Documentation
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
The Lexile Framework ® for Reading The Lexile Framework for Reading: A Web Session for Georgia Parents Professional Development, MetaMetrics ®, Inc.
Control environment and control activities. Day II Session III and IV.
Internal Auditing and Outsourcing
Information Asset Classification
Self Assessment Feedback Logistics R Us GOLD Member.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Policies Jim Stracka The Problem Today.
Information Systems Security Computer System Life Cycle Security.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Documenting the Participation of Fishing Vessel Crew Members in Alaska’s Commercial Fisheries Documenting the Participation of Fishing Vessel Crew Members.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
This chapter is extracted from Sommerville’s slides. Text book chapter
The Readability of JPIF: ERES Milan 2010 The Readability of Academic Papers in the Journal of Property Investment & Finance (JPIF) Stephen Lee Cass Business.
Financial Accounting and Its Environment Chapter 1.
Managing Information System Security: Principles GP Dhillon Associate Professor Virginia Commonwealth University.
CANAR Consortia of Administrators for Native American Rehabilitation FISCAL MANAGEMENT FOR PROJECT SUCCESS CANAR 2012.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Alain Thomas Overview workshop Background to the Principles Definitions The National Principles for Public Engagement What.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Strategies for Knowledge Management Success SCP Best Practices Showcase March 18, 2004.
By: Mrs. Abdallah. The way we taught students in the past simply does not prepare them for the higher demands of college and careers today and in the.
Assessment at KS4 Bury C of E High School Engaging Parents Information.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
ISO DOCUMENT CONTROL. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to: 
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.
BOOK CIRCLES ROLES & RESPONSIBILITIES. Discussion Director ***This is the only required role. Job Description: Your job is to develop a list of questions.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Welcoming, caring, respectful, and safe learning and working environments and student code of conduct A presentation for EIPS leadership, COSC, EIPS staff,
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Managing Information for Transparency November 15, 2010 Monica Fuijkschot Director, Information Management.
Final-placement Meeting 18 October Demonstrate the ability to identify and apply appropriate methods of intervention, describe their theoretical.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

Privacy principles Individual written policies
Current ‘Hot Topics’ in Information Security Governance Auditing
Dr. A .K. Bhattacharyya Professor EEI(NE Region), AAU, Jorhat
Project proposal for ISO 27001:2013 implementation
Data Security and Privacy
CVE.
Cyber security Policy development and implementation
Presentation transcript:

Condescending Corporate Communication How to stop talking down to people

Blogs Credible but not convoluted Write with confidence and refinement but not too technical Conversational but not casual Genuine and clear without being too casual Understanding but not sentimental Use language that is empathetic and helpful Stay away from the acronyms

ComplianceWeek does it right Paragraphs with no more than a few sentences Use dashes to draw attention Use contractions for easy accessibility

Paper ISACA Jonline 2014 Volume 2: Security Policy—Keys to Successful Communication

Success To be successful: – Know your reader – Write for that audience – Remember that comprehension varies – culturally, educational range, age, interest level Remember that the onus is on you to write for the reader

Why this is important ISO 27002: an adequate level of awareness, education, and training in security procedures must be provided and that employees, contractors and third parties are properly briefed on their information security roles and responsibilities prior to being granted access to sensitive information or information systems.

Too often the reality is different The employee is left to his/her own devices to discover the relevant portions of a policy, read and then understand the contents lest he/she suffer the consequences of noncompliance. This effort would be largely successful if policies were written in such a way as to facilitate understanding from the policy audience at large. Instead, many are written at reading levels that surpass the ability of the average employee to comprehend.

Recurring Theme: Reading Level Key study (School Renaissance Institute and Touchstone Applied Science Associates, 2010) showed that that readers comprehend written information best when it is written at their reading level. US Census Bureau – all surveyed regardless of working status Studies show that people comprehend at two grade levels lower than the highest grade level attained

Reading Level Results Only one quarter to one third of workers read at a high school graduate or higher level NCHEMS Workforce Study 74.9% of all population in the active US workforce graduated from high school 37% achieved an Associates or better Reading Level for working population 65%-75% read at 10 th grade level (National Center for Higher Education Management Systems)

Grade 9 Grade 10 Grade 7

If only 25%-35% of the workforce will understand and comprehend the policies you write, doesn’t it make sense when they fail? Should we hold people accountable to policies that they can’t understand?

Roadblocks to Comprehension Research has shown that Acronyms and abbreviations are barriers to understanding Fluency is an important and potentially independent factor that contributes to comprehension skills – This applies to language (ESL) – Fluency in technical jargon, such as acronyms and industry concepts, cannot be assumed

Practical Example My company employs around 1,400 staff – 65% are machine operators and other unskilled workers with no requirement for post-secondary education – The other 35% have at least some post-secondary education – Staff are scattered across the US Policies are hosted on an intranet site (wiki) and training is conducted annually (CBT) Hyperlinks used to: – connect policies to standards and baselines – define terms and point to other resources – show connections between policies The intranet portal allows each employee to search the policies

Intranet Cont’d Policies are written at a grade level – Procedures that support the policy are written at 9-10 grade level and associates are trained on them – Standards and Baselines are full of terminology and acronyms which are referenced via hyperlink

How do you tell at what grade level you write?

Flesch-Kincaid System was developed for the United States Navy in 1975 to test the electronic authoring and delivery of technical information Used by the United States Army for assessing the difficulty of technical manuals in 1978 Became the Department of Defense standard Used in common word processors like MS Word The Commonwealth of Pennsylvania was the first state in the United States to require that automobile insurance policies be written at no higher than a ninth grade level – This is now a common requirement in many other states Two measurements used: Reading ease (chart below) and Grade Level (American grades) Reading Ease ScoreNotes Easily understood by an average 11-year-old student 60-70Easily understood by 13- to 15-year-old students 0-30Best understood by university graduates

Gunning fog index Developed by Robert Gunning in 1952 Designed to determine the years of formal education needed to understand text on a first reading Due to limitations in the formula, Flesch- Kincaid is generally preferred over Fog

Coleman–Liau index Designed by Meri Coleman and T. L. Liau Relies on characters instead of syllables per word Advantage is that it is easier to automate the count of characters over syllables

Automated Readability Index Was designed for real-time monitoring of readability on electric typewriters Like Coleman-Liau, uses characters not syllables

PHP Readability Test Tool TestScore/GradeNotes Flesch-Kincaid Reading Ease44.3 Flesch-Kincaid Grade Level12.3 Gunning-Fog Score15.8 Coleman-Liau Index13.9 L = avg # letters/100 words S = avg # sentences/100 words. SMOG Index11.8 Automated Readability Index12.8 Average Readability Level Readability results from the ComplianceWeek Blog post:

Word Lists Oldest method used to determine reading comprehension Top 1,000 words list (Wikipedia maintains) Approach recorded as early as 2,000 years ago Experimentally validated in early 1900s Word lists are used to define writing styles for authors of Readers Digest and other magazines designed to be read by the largest audience

Examples

Georgia Technology Authority: Information Security Technology Risk Management Policy PURPOSE “Risk” is the net negative impact of the exploitation of a vulnerability, considering both the probability and the impact of occurrence. “Risk management” is the process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level. An effective risk management process is an important component of a successful IT security program and an essential management function of the organization. The principal goal of an organization’s risk management process is to protect the organization and its ability to perform their mission. It fosters informed decision making, allowing the security management organization to balance the operation and economic costs of protective measures and achieve gains in mission capability. This policy requires agencies to take a risk-based approach to securing their information systems. POLICY Each agency shall institute an organization-wide risk management approach to information security that assesses the risks (including the magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction) to information and information systems that support the operations and assets of the organization. Each agency shall develop policies, procedures and select cost-effective controls (based on the risk assessment) that reduce information security risks to an acceptable level and ensure information security is addressed throughout the lifecycle of each organization’s information systems. ItemNotes Reading EaseBest understood by university graduates Grade LevelPost Doctorate

Make it more readable Original text Slight modification “Risk” is the possibility that something bad or unpleasant (such as an injury or a loss) will happen because of being vulnerable. The amount of risk is determined by figuring out how likely the possibility is to occur and how bad it will be. “Risk management” is how we identify risk, assess risk, and figuring out how to make it less likely that something bad will happen. It is important for us to have a risk management program as a part of our IT security program and it is essential to have it in the organization. “ Risk ” is the net negative impact of the exploitation of a vulnerability, considering both the probability and the impact of occurrence. “ Risk management ” is the process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level. An effective risk management process is an important component of a successful IT security program and an essential management function of the organization. Reading EaseBest understood by university graduates Grade LevelPost Doctorate Reading EaseBest understood year old students Grade Level12th

More from GTA Definition of “Access Management” Access Management - The process responsible for allowing users to make use of IT Services, data or other assets. Access Management helps to protect the confidentiality, integrity and availability of assets by ensuring that only authorized Users are able to access or modify the assets. Access Management is sometimes referred to as Rights Management or Identity Management. Reading EaseBest understood by university graduates Grade LevelPost secondary degree Definition of “Malware” Malware, malicious code, malicious software - refers to a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or otherwise annoying or disrupting the victim. Major forms of malware include but are not limited to: viruses, virus hoaxes, worms, Trojan Horses, malicious mobile code, blended attacks, spyware, attacker backdoors and toolkits. Reading EaseBest understood by university graduates Grade LevelPost secondary degree

SunTrust Privacy Policy Your privacy is our priority SunTrust understands that financial information protection is important to you, especially in today’s online environment. With SunTrust's Privacy Policy, you can be assured that we use information responsibly to provide you with the services you request, and to make doing business with SunTrust easier and more convenient. Three things to know about financial information protection at SunTrust: Because trust is critical to a solid financial relationship, SunTrust outlines exactly how and when your personal information is used in our SunTrust Privacy Policy. (Note: Adobe Reader is required to view the privacy policy documentation. Click here if you need to download Adobe Reader.) You may have different ideas and expectations about privacy, which is why our consumer privacy preferences make it easy to further limit how your information is shared. Privacy and security are a must when banking online. Our online privacy practices explain exactly how SunTrust collects, uses and protects information about your online activity. The most effective privacy protection is the precautions you take to guard your account and personal information. Review our privacy resources to learn how to protect your information. ItemNotes Reading EaseBest understood by university graduates Grade LevelFreshman in college

Google memo This Tuesday (1/21), the San Francisco Municipal Transportation Agency (SFMTA) Board will meet to vote on the proposed shuttle regulations we told you about last week. The hearing will take place on January 21 at 1pm PT at San Francisco City Hall (room 400). While we recognized that many of you won't be able to make it during the workday, we encourage any interested Googlers who live in San Francisco to speak in favor of the proposal (please RSVP here if you are planning to attend). While you are not required to state where you work, you may confirm that Google is your employer if you are so inclined. If you do choose to speak in favor of the proposal we thought you might appreciate some guidance on what to say. Feel free to add your own style and opinion. *I am so proud to live in San Francisco and be a part of this community *I support local and small businesses in my neighborhood on a regular basis *My shuttle empowers my colleagues and I to reduce our carbon emissions by removing cars from the road *If the shuttle program didn't exist, I would continue to live in San Francisco and drive to work on the peninsula *I am a shuttle rider, SF resident, and I volunteer at….. *Because of the above, I urge the Board to adopt this pilot as a reasonable step in the right direction ItemNotes Reading Ease 13- to 15-year-old students Grade LevelSophomore in High School

Conclusion When we use terms and concepts that cannot be understood, and we demand compliance, we appear to be condescending Empathy is as important a skill when writing policies or other corporate communication as is a large vocabulary It is important to know your audience