SlideShare une entreprise Scribd logo
1  sur  23
Social Media as a Record for Public
Services and Utilities in a Disaster
How Government and Public Utilities used Social
Media during “Post-Tropical Cyclone” Sandy
People Like Social Media
Pew Research Center’s Internet & American Life Project
• 65% of adult internet users now say they use a social networking site
like MySpace, Facebook or LinkedIn. (2011)
• 74% of smartphone owners use their phone to get real-time locationbased information. (2012)
• Some 15% of online adults use Twitter. (2012)

Dartmouth Survey: Social Media Use by Fortune 500 Companies
• 73% of Gas and Electric Utilities (16 of 22) used Twitter,
50% used Facebook, and 27% hosted a blog. (2012)

Red Cross Survey (July 2010)
• Social media sites ranked fourth as a resource for emergency
information behind television news, radio and online news sites
• One in five would try to contact responders through a digital means
such as e-mail, websites or social media
• Nearly half believe a response agency is probably already responding
to any urgent request they might see
Social Media can be a Record
“Made or received by an organization in pursuance of legal
obligations or in the transaction of business” — ARMA
However
“The scope of discovery of electronically stored information does
not depend on the internal designation or records classification
that may or may not have been assigned to it. Any electronically
stored information, whether or not it is internally viewed as of
business, legal, regulatory, or personal value, is potentially
discoverable.” — The Sedona Conference
Social Media Policy
AIIM International
• Integrate social media into an organization’s existing
governance policy.
• Policy should be “channel-neutral”.

Patricia Franks, San Jose State University SLIS
• Guided by the Generally Accepted Recordkeeping
Principles.
• Create a crosswalk between the existing records
retention schedule and records generated through
social media.
Sample from Patricia Franks RACO 2011 Presentation:
“How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”
Social Media and Sandy
Disasters = Unique Communication Environment
Time-Sensitive: Little time for reflection, open debate, rebuttals
Suppression: No longer an option
Counter
• Outdated, inaccurate, or
false information
• Malicious use
Provide
• “Expand the use of newer technologies to communicate with
customers during outages (i.e. email, text messaging, and
social media).” — Utility Performance Report Following Hurricane Irene
and Tropical Storm Lee NYS Public Service Commission, June 2012
Social Media and Sandy
Six Categories of Social Media Use in a Disaster
• Public safety and crisis information disseminated
before, during, and after various incidents;
• Notifications for training or mobilizing first responders;
• Sending emergency warnings and alerts;
• Gaining situational awareness and utilizing multi-directional
communications;
• Responding to requests for assistance;
• Aiding in recovery efforts.
Social Media and Disasters: Current Uses, Future Options, and Policy
Considerations, Congressional Research Service, Sept. 2011
Social Media and Sandy
Public safety and crisis information disseminated
before, during, and after
Social Media and Sandy
Public safety and crisis information disseminated
before, during, and after
Social Media and Sandy
Sending emergency warnings and alerts
Social Media and Sandy
Responding to requests for assistance
Social Media and Sandy
Direct message responses to
requests for assistance
and privacy issues
Social Media and Sandy
Gaining situational awareness and
utilizing multi-directional communications
Gaining situational awareness
and utilizing multi-directional
communications
+
Responding to requests
for assistance
Social Media and Sandy

Gaining situational awareness
and utilizing multi-directional
communications
(in a not good way)
Social Media and Sandy
Aiding in recovery efforts
Social Media and Sandy
Not Aiding in recovery efforts with incomplete information

3 Days Apart
Social Media and Sandy
Notifications for training or mobilizing first responders
(not really this time)
Social Media and Sandy
GARP
Accountability and Transparency
• Documented and approved social media policy or that social
media is included in a “channel-neutral” communications
policy or internet policy.
• Tool-specific and sector-specific procedures.
• Have print copies of policy and procedures at backup site.
• Specify who will manage social media accounts during a
disaster and train them
on special case usage.
Social Media and Sandy
GARP
Integrity and Protection
• Clearly link identity to the organization and comply with
the social media/communications policy
• Ensure protection of data by updating data maps of the
physical locations of all electronically stored records
• Vet the reliability of any third party vendor
• Alternative channels if platform goes down
• Keep account in the hands of appropriate users and
avoid malicious hijacking
Social Media and Sandy
GARP
Compliance
• Maintain records in keeping with company policy, applicable
local, state, or federal laws as well as any industry regulations.
• Evaluate the risks and
benefits of channel silence
on an issue.
Social Media and Sandy
GARP
Availability, Retention, and Disposition
• Evaluate services for capture, indexing, and retrieval
(ArchiveSocial, Next Point CloudPreservation, Hanzo Archives)
• Evaluate appropriate posting tools
(Hootsuite, Radian 6)
• Limits of control over third-party software:
What if needed for longer than the terms of service allows?
What if records should not exist as long as services maintain?
Resources
• Franks, Patricia “How Federal Agencies Can Effectively
Manage Records Created Using New Social Media Tools” IBM
Center for The Business of Government, 2012
• Lindsay, Bruce “Social Media and Disasters: Current
Uses, Future Options, and Policy Considerations” Library of
Congress, Congressional Research Service, Sept. 6, 2011
• Redgrave, Jonathan “The Sedona Principles (Second Edition)”
The Sedona Conference, June 2007
• “Best Practices Study of Social Media Records Policies” ACTIAC Collaboration & Transformation (C&T) Shared Interest
Group (SIG), March 2011

Contenu connexe

Tendances

Exploring big ‘crisis’ data in action: potential positive and negative extern...
Exploring big ‘crisis’ data in action: potential positive and negative extern...Exploring big ‘crisis’ data in action: potential positive and negative extern...
Exploring big ‘crisis’ data in action: potential positive and negative extern...Trilateral Research
 
Moving Forward with Open Data Science - SWOT Analysis
Moving Forward with Open Data Science - SWOT AnalysisMoving Forward with Open Data Science - SWOT Analysis
Moving Forward with Open Data Science - SWOT AnalysisPhilip Bourne
 
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...Lisette Giepmans
 
DWF WP2 BIREME WHO Lowcostlaptop 20080604
DWF WP2 BIREME WHO Lowcostlaptop 20080604DWF WP2 BIREME WHO Lowcostlaptop 20080604
DWF WP2 BIREME WHO Lowcostlaptop 20080604Ron Burger
 
Towards a Platform for Global Health
Towards a Platform for Global HealthTowards a Platform for Global Health
Towards a Platform for Global HealthPhilip Bourne
 
Observation of Katrina/Rita Groove Deployment: Addressing Social and Communi...
Observation of Katrina/Rita Groove Deployment:  Addressing Social and Communi...Observation of Katrina/Rita Groove Deployment:  Addressing Social and Communi...
Observation of Katrina/Rita Groove Deployment: Addressing Social and Communi...Shelly D. Farnham, Ph.D.
 
14 mejri new configurationict-indisasters-ws2014
14 mejri new configurationict-indisasters-ws201414 mejri new configurationict-indisasters-ws2014
14 mejri new configurationict-indisasters-ws2014Luca Marescotti
 
Health Policy and Management as it Relates to Big Data
Health Policy and Management as it Relates to Big DataHealth Policy and Management as it Relates to Big Data
Health Policy and Management as it Relates to Big DataPhilip Bourne
 
Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013Anahi Iacucci
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottiercitasa
 
Introduction to Mining Social Media Data
Introduction to Mining Social Media DataIntroduction to Mining Social Media Data
Introduction to Mining Social Media DataMiriam Fernandez
 
Social surveillance aoife shona
Social surveillance aoife shonaSocial surveillance aoife shona
Social surveillance aoife shonaAoife Brown
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through TechnologyHeather Blanchard
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Ansgar Koene
 
An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...The University of Texas (UTRGV)
 
Global mHealth Landscape Hhs
Global mHealth Landscape  HhsGlobal mHealth Landscape  Hhs
Global mHealth Landscape HhsJody Ranck
 
Remixing Public Health: Tools for Public Health Innovation
Remixing Public Health: Tools for Public Health InnovationRemixing Public Health: Tools for Public Health Innovation
Remixing Public Health: Tools for Public Health InnovationJody Ranck
 
Safecast long version oct 2015
Safecast long version oct 2015Safecast long version oct 2015
Safecast long version oct 2015Safecast
 

Tendances (20)

Exploring big ‘crisis’ data in action: potential positive and negative extern...
Exploring big ‘crisis’ data in action: potential positive and negative extern...Exploring big ‘crisis’ data in action: potential positive and negative extern...
Exploring big ‘crisis’ data in action: potential positive and negative extern...
 
Moving Forward with Open Data Science - SWOT Analysis
Moving Forward with Open Data Science - SWOT AnalysisMoving Forward with Open Data Science - SWOT Analysis
Moving Forward with Open Data Science - SWOT Analysis
 
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
 
DWF WP2 BIREME WHO Lowcostlaptop 20080604
DWF WP2 BIREME WHO Lowcostlaptop 20080604DWF WP2 BIREME WHO Lowcostlaptop 20080604
DWF WP2 BIREME WHO Lowcostlaptop 20080604
 
Towards a Platform for Global Health
Towards a Platform for Global HealthTowards a Platform for Global Health
Towards a Platform for Global Health
 
Observation of Katrina/Rita Groove Deployment: Addressing Social and Communi...
Observation of Katrina/Rita Groove Deployment:  Addressing Social and Communi...Observation of Katrina/Rita Groove Deployment:  Addressing Social and Communi...
Observation of Katrina/Rita Groove Deployment: Addressing Social and Communi...
 
14 mejri new configurationict-indisasters-ws2014
14 mejri new configurationict-indisasters-ws201414 mejri new configurationict-indisasters-ws2014
14 mejri new configurationict-indisasters-ws2014
 
Health Policy and Management as it Relates to Big Data
Health Policy and Management as it Relates to Big DataHealth Policy and Management as it Relates to Big Data
Health Policy and Management as it Relates to Big Data
 
Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 
Introduction to Mining Social Media Data
Introduction to Mining Social Media DataIntroduction to Mining Social Media Data
Introduction to Mining Social Media Data
 
Social surveillance aoife shona
Social surveillance aoife shonaSocial surveillance aoife shona
Social surveillance aoife shona
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through Technology
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)
 
Meraz
MerazMeraz
Meraz
 
An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Global mHealth Landscape Hhs
Global mHealth Landscape  HhsGlobal mHealth Landscape  Hhs
Global mHealth Landscape Hhs
 
Remixing Public Health: Tools for Public Health Innovation
Remixing Public Health: Tools for Public Health InnovationRemixing Public Health: Tools for Public Health Innovation
Remixing Public Health: Tools for Public Health Innovation
 
Safecast long version oct 2015
Safecast long version oct 2015Safecast long version oct 2015
Safecast long version oct 2015
 

Similaire à Social Media as a Record for Public Services and Utilities in a Disaster

Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsOptimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsJames Embleton-Forrest, BA, MCGI
 
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)Twittercrisis
 
No Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media MonitoringNo Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media MonitoringTamer Hadi
 
SPEAK Social media and crisis communication during cascading disasters, Elisa...
SPEAK Social media and crisis communication during cascading disasters, Elisa...SPEAK Social media and crisis communication during cascading disasters, Elisa...
SPEAK Social media and crisis communication during cascading disasters, Elisa...Global Risk Forum GRFDavos
 
Climate Action Hackathon
Climate Action HackathonClimate Action Hackathon
Climate Action HackathonGreg Benchwick
 
New media: Potential for the ICRC
New media: Potential for the ICRCNew media: Potential for the ICRC
New media: Potential for the ICRCSanjana Hattotuwa
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Corey Olszewski
 
Social Media in Government
Social Media in GovernmentSocial Media in Government
Social Media in GovernmentJudith A Newton
 
Effective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications PlanningEffective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications PlanningCarol Spencer
 
Social Media Survival Guide for Public Safety
Social Media Survival Guide for Public SafetySocial Media Survival Guide for Public Safety
Social Media Survival Guide for Public SafetyBrett Hicks
 
Utilize Digital and Social Media Data to Inform Your Research in Novel Ways
Utilize Digital and Social Media Data to Inform Your Research in Novel WaysUtilize Digital and Social Media Data to Inform Your Research in Novel Ways
Utilize Digital and Social Media Data to Inform Your Research in Novel WaysKatja Reuter, PhD
 
Effective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications PlanningEffective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications PlanningCarol Spencer
 
Signal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementSignal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementIntergen
 
How Social Media is Shaping Disaster Response
How Social Media is Shaping Disaster ResponseHow Social Media is Shaping Disaster Response
How Social Media is Shaping Disaster ResponseDell Services
 
Models of Social Media Adoption in Australian Emergency Management Organisations
Models of Social Media Adoption in Australian Emergency Management OrganisationsModels of Social Media Adoption in Australian Emergency Management Organisations
Models of Social Media Adoption in Australian Emergency Management OrganisationsJudith A Newton
 
OCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergenciesOCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergenciesJan Husar
 
Social network analysis
Social network analysisSocial network analysis
Social network analysiscontentli
 
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxjeffsrosalyn
 

Similaire à Social Media as a Record for Public Services and Utilities in a Disaster (20)

Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsOptimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
 
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
 
No Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media MonitoringNo Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media Monitoring
 
SPEAK Social media and crisis communication during cascading disasters, Elisa...
SPEAK Social media and crisis communication during cascading disasters, Elisa...SPEAK Social media and crisis communication during cascading disasters, Elisa...
SPEAK Social media and crisis communication during cascading disasters, Elisa...
 
Climate Action Hackathon
Climate Action HackathonClimate Action Hackathon
Climate Action Hackathon
 
Public deck
Public deckPublic deck
Public deck
 
New media: Potential for the ICRC
New media: Potential for the ICRCNew media: Potential for the ICRC
New media: Potential for the ICRC
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
 
Social Media in Government
Social Media in GovernmentSocial Media in Government
Social Media in Government
 
Effective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications PlanningEffective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications Planning
 
Social Media Survival Guide for Public Safety
Social Media Survival Guide for Public SafetySocial Media Survival Guide for Public Safety
Social Media Survival Guide for Public Safety
 
Social Media for the Meta-Leader
Social Media for the Meta-LeaderSocial Media for the Meta-Leader
Social Media for the Meta-Leader
 
Utilize Digital and Social Media Data to Inform Your Research in Novel Ways
Utilize Digital and Social Media Data to Inform Your Research in Novel WaysUtilize Digital and Social Media Data to Inform Your Research in Novel Ways
Utilize Digital and Social Media Data to Inform Your Research in Novel Ways
 
Effective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications PlanningEffective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications Planning
 
Signal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementSignal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency management
 
How Social Media is Shaping Disaster Response
How Social Media is Shaping Disaster ResponseHow Social Media is Shaping Disaster Response
How Social Media is Shaping Disaster Response
 
Models of Social Media Adoption in Australian Emergency Management Organisations
Models of Social Media Adoption in Australian Emergency Management OrganisationsModels of Social Media Adoption in Australian Emergency Management Organisations
Models of Social Media Adoption in Australian Emergency Management Organisations
 
OCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergenciesOCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergencies
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Social Media as a Record for Public Services and Utilities in a Disaster

  • 1. Social Media as a Record for Public Services and Utilities in a Disaster How Government and Public Utilities used Social Media during “Post-Tropical Cyclone” Sandy
  • 2. People Like Social Media Pew Research Center’s Internet & American Life Project • 65% of adult internet users now say they use a social networking site like MySpace, Facebook or LinkedIn. (2011) • 74% of smartphone owners use their phone to get real-time locationbased information. (2012) • Some 15% of online adults use Twitter. (2012) Dartmouth Survey: Social Media Use by Fortune 500 Companies • 73% of Gas and Electric Utilities (16 of 22) used Twitter, 50% used Facebook, and 27% hosted a blog. (2012) Red Cross Survey (July 2010) • Social media sites ranked fourth as a resource for emergency information behind television news, radio and online news sites • One in five would try to contact responders through a digital means such as e-mail, websites or social media • Nearly half believe a response agency is probably already responding to any urgent request they might see
  • 3. Social Media can be a Record “Made or received by an organization in pursuance of legal obligations or in the transaction of business” — ARMA However “The scope of discovery of electronically stored information does not depend on the internal designation or records classification that may or may not have been assigned to it. Any electronically stored information, whether or not it is internally viewed as of business, legal, regulatory, or personal value, is potentially discoverable.” — The Sedona Conference
  • 4. Social Media Policy AIIM International • Integrate social media into an organization’s existing governance policy. • Policy should be “channel-neutral”. Patricia Franks, San Jose State University SLIS • Guided by the Generally Accepted Recordkeeping Principles. • Create a crosswalk between the existing records retention schedule and records generated through social media.
  • 5. Sample from Patricia Franks RACO 2011 Presentation: “How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”
  • 6. Social Media and Sandy Disasters = Unique Communication Environment Time-Sensitive: Little time for reflection, open debate, rebuttals Suppression: No longer an option Counter • Outdated, inaccurate, or false information • Malicious use Provide • “Expand the use of newer technologies to communicate with customers during outages (i.e. email, text messaging, and social media).” — Utility Performance Report Following Hurricane Irene and Tropical Storm Lee NYS Public Service Commission, June 2012
  • 7. Social Media and Sandy Six Categories of Social Media Use in a Disaster • Public safety and crisis information disseminated before, during, and after various incidents; • Notifications for training or mobilizing first responders; • Sending emergency warnings and alerts; • Gaining situational awareness and utilizing multi-directional communications; • Responding to requests for assistance; • Aiding in recovery efforts. Social Media and Disasters: Current Uses, Future Options, and Policy Considerations, Congressional Research Service, Sept. 2011
  • 8. Social Media and Sandy Public safety and crisis information disseminated before, during, and after
  • 9. Social Media and Sandy Public safety and crisis information disseminated before, during, and after
  • 10. Social Media and Sandy Sending emergency warnings and alerts
  • 11. Social Media and Sandy Responding to requests for assistance
  • 12. Social Media and Sandy Direct message responses to requests for assistance and privacy issues
  • 13. Social Media and Sandy Gaining situational awareness and utilizing multi-directional communications
  • 14. Gaining situational awareness and utilizing multi-directional communications + Responding to requests for assistance
  • 15. Social Media and Sandy Gaining situational awareness and utilizing multi-directional communications (in a not good way)
  • 16. Social Media and Sandy Aiding in recovery efforts
  • 17. Social Media and Sandy Not Aiding in recovery efforts with incomplete information 3 Days Apart
  • 18. Social Media and Sandy Notifications for training or mobilizing first responders (not really this time)
  • 19. Social Media and Sandy GARP Accountability and Transparency • Documented and approved social media policy or that social media is included in a “channel-neutral” communications policy or internet policy. • Tool-specific and sector-specific procedures. • Have print copies of policy and procedures at backup site. • Specify who will manage social media accounts during a disaster and train them on special case usage.
  • 20. Social Media and Sandy GARP Integrity and Protection • Clearly link identity to the organization and comply with the social media/communications policy • Ensure protection of data by updating data maps of the physical locations of all electronically stored records • Vet the reliability of any third party vendor • Alternative channels if platform goes down • Keep account in the hands of appropriate users and avoid malicious hijacking
  • 21. Social Media and Sandy GARP Compliance • Maintain records in keeping with company policy, applicable local, state, or federal laws as well as any industry regulations. • Evaluate the risks and benefits of channel silence on an issue.
  • 22. Social Media and Sandy GARP Availability, Retention, and Disposition • Evaluate services for capture, indexing, and retrieval (ArchiveSocial, Next Point CloudPreservation, Hanzo Archives) • Evaluate appropriate posting tools (Hootsuite, Radian 6) • Limits of control over third-party software: What if needed for longer than the terms of service allows? What if records should not exist as long as services maintain?
  • 23. Resources • Franks, Patricia “How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools” IBM Center for The Business of Government, 2012 • Lindsay, Bruce “Social Media and Disasters: Current Uses, Future Options, and Policy Considerations” Library of Congress, Congressional Research Service, Sept. 6, 2011 • Redgrave, Jonathan “The Sedona Principles (Second Edition)” The Sedona Conference, June 2007 • “Best Practices Study of Social Media Records Policies” ACTIAC Collaboration & Transformation (C&T) Shared Interest Group (SIG), March 2011