Ownership of social media assets
Enthusiastic employees often set up business related social media accounts. For instance there are many unofficial company Twitter accounts run by employees rather than the company. And company fans can play a part too, setting up Facebook pages to promote the brands they love. Coca Cola's largest Facebook page is run by fans, supported by Coke.
Companies need to know how to manage these unofficial sites. They may need to be able to retain control of them if an employee who runs a successful Twitter account leaves the company. They will need to take decisions about how to deal with fan sites in a positive way that balances retaining control of their IP with avoiding any damage to the benefits their fans are delivering.
There are plenty of examples of social media accounts being hijacked by third parties. Perhaps the most infamous example is the hijacking of news agency AP's Twitter account by the Syrian Electronic Army in 2013. Their untrue tweets about a bomb in the White House knocked over $130 billion from the US stock market!
Lax password protocols can cause real damage to organisations. And, unlike passwords for corporate networks, passwords for social media accounts are rarely policed by IT departments. There is real risk here. And there are simple ways of mitigating these risks.