Social Media Outlet Authentication Best Practices



Members of the Federal Web Managers community have expressed concern that government agencies and organizations are being mimicked or “spoofed” by unofficial third parties on social media sites.


This wiki contains proposed best practices for government agencies and organizations to establish their authenticity when communicating through social media outlets, including recommendations specifically for Facebook, Twitter, YouTube, and Flickr.


Table of Contents



Please add additional best practices for these and other outlets.



General authentication best practices


Claim authenticity


Library of Congress Asserting Authority on Flickr


Be assertive about claiming your authenticity by clearly stating that your social media outlet is official. Many spoofers are wary to overtly claim to be an official government source, particularly as doing so would violate many social media outlets’ Terms of Service.


Provide reciprocal links


Image of links to Facebook, Twitter, and YouTube on


The simplest way to prove the authenticity of a social media outlet is to link to it from your .gov domain and link to your .gov domain from your social media outlet.


Ensure that links to your social media outlets are visible on your .gov home page, or accessible from a first level section of your site. This will help people who find your social media outlet more easily confirm your authenticity when they visit your .gov domain.




Speak with a consistent voice and tone

Develop and use editorial guidelines to ensure that communications through social media outlets are consistent, authoritative, and support your mission.


Voice and tone of social media outlets will vary across agency and program. Examples:


Defend your intellectual property 

Become familiar with your agency’s trademarks and other intellectual property, and consult your attorneys if you encounter proprietary agency logos or trademarks on unauthorized sites or social media outlets.


A simple message notifying administrators of spoofing social media outlets that they are violating intellectual property laws may be enough to stop them.



Facebook authentication best practices




Twitter authentication best practices




YouTube authentication best practices




Flickr authentication best practices