SlideShare a Scribd company logo
Social Media as a Record for Public
Services and Utilities in a Disaster
How Government and Public Utilities used Social
Media during “Post-Tropical Cyclone” Sandy
People Like Social Media
Pew Research Center’s Internet & American Life Project
• 65% of adult internet users now say they use a social networking site
like MySpace, Facebook or LinkedIn. (2011)
• 74% of smartphone owners use their phone to get real-time locationbased information. (2012)
• Some 15% of online adults use Twitter. (2012)

Dartmouth Survey: Social Media Use by Fortune 500 Companies
• 73% of Gas and Electric Utilities (16 of 22) used Twitter,
50% used Facebook, and 27% hosted a blog. (2012)

Red Cross Survey (July 2010)
• Social media sites ranked fourth as a resource for emergency
information behind television news, radio and online news sites
• One in five would try to contact responders through a digital means
such as e-mail, websites or social media
• Nearly half believe a response agency is probably already responding
to any urgent request they might see
Social Media can be a Record
“Made or received by an organization in pursuance of legal
obligations or in the transaction of business” — ARMA
However
“The scope of discovery of electronically stored information does
not depend on the internal designation or records classification
that may or may not have been assigned to it. Any electronically
stored information, whether or not it is internally viewed as of
business, legal, regulatory, or personal value, is potentially
discoverable.” — The Sedona Conference
Social Media Policy
AIIM International
• Integrate social media into an organization’s existing
governance policy.
• Policy should be “channel-neutral”.

Patricia Franks, San Jose State University SLIS
• Guided by the Generally Accepted Recordkeeping
Principles.
• Create a crosswalk between the existing records
retention schedule and records generated through
social media.
Sample from Patricia Franks RACO 2011 Presentation:
“How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”
Social Media and Sandy
Disasters = Unique Communication Environment
Time-Sensitive: Little time for reflection, open debate, rebuttals
Suppression: No longer an option
Counter
• Outdated, inaccurate, or
false information
• Malicious use
Provide
• “Expand the use of newer technologies to communicate with
customers during outages (i.e. email, text messaging, and
social media).” — Utility Performance Report Following Hurricane Irene
and Tropical Storm Lee NYS Public Service Commission, June 2012
Social Media and Sandy
Six Categories of Social Media Use in a Disaster
• Public safety and crisis information disseminated
before, during, and after various incidents;
• Notifications for training or mobilizing first responders;
• Sending emergency warnings and alerts;
• Gaining situational awareness and utilizing multi-directional
communications;
• Responding to requests for assistance;
• Aiding in recovery efforts.
Social Media and Disasters: Current Uses, Future Options, and Policy
Considerations, Congressional Research Service, Sept. 2011
Social Media and Sandy
Public safety and crisis information disseminated
before, during, and after
Social Media and Sandy
Public safety and crisis information disseminated
before, during, and after
Social Media and Sandy
Sending emergency warnings and alerts
Social Media and Sandy
Responding to requests for assistance
Social Media and Sandy
Direct message responses to
requests for assistance
and privacy issues
Social Media and Sandy
Gaining situational awareness and
utilizing multi-directional communications
Gaining situational awareness
and utilizing multi-directional
communications
+
Responding to requests
for assistance
Social Media and Sandy

Gaining situational awareness
and utilizing multi-directional
communications
(in a not good way)
Social Media and Sandy
Aiding in recovery efforts
Social Media and Sandy
Not Aiding in recovery efforts with incomplete information

3 Days Apart
Social Media and Sandy
Notifications for training or mobilizing first responders
(not really this time)
Social Media and Sandy
GARP
Accountability and Transparency
• Documented and approved social media policy or that social
media is included in a “channel-neutral” communications
policy or internet policy.
• Tool-specific and sector-specific procedures.
• Have print copies of policy and procedures at backup site.
• Specify who will manage social media accounts during a
disaster and train them
on special case usage.
Social Media and Sandy
GARP
Integrity and Protection
• Clearly link identity to the organization and comply with
the social media/communications policy
• Ensure protection of data by updating data maps of the
physical locations of all electronically stored records
• Vet the reliability of any third party vendor
• Alternative channels if platform goes down
• Keep account in the hands of appropriate users and
avoid malicious hijacking
Social Media and Sandy
GARP
Compliance
• Maintain records in keeping with company policy, applicable
local, state, or federal laws as well as any industry regulations.
• Evaluate the risks and
benefits of channel silence
on an issue.
Social Media and Sandy
GARP
Availability, Retention, and Disposition
• Evaluate services for capture, indexing, and retrieval
(ArchiveSocial, Next Point CloudPreservation, Hanzo Archives)
• Evaluate appropriate posting tools
(Hootsuite, Radian 6)
• Limits of control over third-party software:
What if needed for longer than the terms of service allows?
What if records should not exist as long as services maintain?
Resources
• Franks, Patricia “How Federal Agencies Can Effectively
Manage Records Created Using New Social Media Tools” IBM
Center for The Business of Government, 2012
• Lindsay, Bruce “Social Media and Disasters: Current
Uses, Future Options, and Policy Considerations” Library of
Congress, Congressional Research Service, Sept. 6, 2011
• Redgrave, Jonathan “The Sedona Principles (Second Edition)”
The Sedona Conference, June 2007
• “Best Practices Study of Social Media Records Policies” ACTIAC Collaboration & Transformation (C&T) Shared Interest
Group (SIG), March 2011

More Related Content

What's hot

Exploring big ‘crisis’ data in action: potential positive and negative extern...
Exploring big ‘crisis’ data in action: potential positive and negative extern...Exploring big ‘crisis’ data in action: potential positive and negative extern...
Exploring big ‘crisis’ data in action: potential positive and negative extern...
Trilateral Research
 
Moving Forward with Open Data Science - SWOT Analysis
Moving Forward with Open Data Science - SWOT AnalysisMoving Forward with Open Data Science - SWOT Analysis
Moving Forward with Open Data Science - SWOT Analysis
Philip Bourne
 
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
Lisette Giepmans
 
DWF WP2 BIREME WHO Lowcostlaptop 20080604
DWF WP2 BIREME WHO Lowcostlaptop 20080604DWF WP2 BIREME WHO Lowcostlaptop 20080604
DWF WP2 BIREME WHO Lowcostlaptop 20080604Ron Burger
 
Towards a Platform for Global Health
Towards a Platform for Global HealthTowards a Platform for Global Health
Towards a Platform for Global Health
Philip Bourne
 
Observation of Katrina/Rita Groove Deployment: Addressing Social and Communi...
Observation of Katrina/Rita Groove Deployment:  Addressing Social and Communi...Observation of Katrina/Rita Groove Deployment:  Addressing Social and Communi...
Observation of Katrina/Rita Groove Deployment: Addressing Social and Communi...
Shelly D. Farnham, Ph.D.
 
14 mejri new configurationict-indisasters-ws2014
14 mejri new configurationict-indisasters-ws201414 mejri new configurationict-indisasters-ws2014
14 mejri new configurationict-indisasters-ws2014Luca Marescotti
 
Health Policy and Management as it Relates to Big Data
Health Policy and Management as it Relates to Big DataHealth Policy and Management as it Relates to Big Data
Health Policy and Management as it Relates to Big Data
Philip Bourne
 
Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013
Anahi Iacucci
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
citasa
 
Introduction to Mining Social Media Data
Introduction to Mining Social Media DataIntroduction to Mining Social Media Data
Introduction to Mining Social Media Data
Miriam Fernandez
 
Social surveillance aoife shona
Social surveillance aoife shonaSocial surveillance aoife shona
Social surveillance aoife shona
Aoife Brown
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through Technology
Heather Blanchard
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)
Ansgar Koene
 
Meraz
MerazMeraz
An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...
The University of Texas (UTRGV)
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
Boston Global Forum
 
Global mHealth Landscape Hhs
Global mHealth Landscape  HhsGlobal mHealth Landscape  Hhs
Global mHealth Landscape Hhs
Jody Ranck
 
Remixing Public Health: Tools for Public Health Innovation
Remixing Public Health: Tools for Public Health InnovationRemixing Public Health: Tools for Public Health Innovation
Remixing Public Health: Tools for Public Health Innovation
Jody Ranck
 
Safecast long version oct 2015
Safecast long version oct 2015Safecast long version oct 2015
Safecast long version oct 2015
Safecast
 

What's hot (20)

Exploring big ‘crisis’ data in action: potential positive and negative extern...
Exploring big ‘crisis’ data in action: potential positive and negative extern...Exploring big ‘crisis’ data in action: potential positive and negative extern...
Exploring big ‘crisis’ data in action: potential positive and negative extern...
 
Moving Forward with Open Data Science - SWOT Analysis
Moving Forward with Open Data Science - SWOT AnalysisMoving Forward with Open Data Science - SWOT Analysis
Moving Forward with Open Data Science - SWOT Analysis
 
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
BioSHaRE: Operationalizing responsible data sharing and access: GA4GH - Barth...
 
DWF WP2 BIREME WHO Lowcostlaptop 20080604
DWF WP2 BIREME WHO Lowcostlaptop 20080604DWF WP2 BIREME WHO Lowcostlaptop 20080604
DWF WP2 BIREME WHO Lowcostlaptop 20080604
 
Towards a Platform for Global Health
Towards a Platform for Global HealthTowards a Platform for Global Health
Towards a Platform for Global Health
 
Observation of Katrina/Rita Groove Deployment: Addressing Social and Communi...
Observation of Katrina/Rita Groove Deployment:  Addressing Social and Communi...Observation of Katrina/Rita Groove Deployment:  Addressing Social and Communi...
Observation of Katrina/Rita Groove Deployment: Addressing Social and Communi...
 
14 mejri new configurationict-indisasters-ws2014
14 mejri new configurationict-indisasters-ws201414 mejri new configurationict-indisasters-ws2014
14 mejri new configurationict-indisasters-ws2014
 
Health Policy and Management as it Relates to Big Data
Health Policy and Management as it Relates to Big DataHealth Policy and Management as it Relates to Big Data
Health Policy and Management as it Relates to Big Data
 
Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 
Introduction to Mining Social Media Data
Introduction to Mining Social Media DataIntroduction to Mining Social Media Data
Introduction to Mining Social Media Data
 
Social surveillance aoife shona
Social surveillance aoife shonaSocial surveillance aoife shona
Social surveillance aoife shona
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through Technology
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)
 
Meraz
MerazMeraz
Meraz
 
An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Global mHealth Landscape Hhs
Global mHealth Landscape  HhsGlobal mHealth Landscape  Hhs
Global mHealth Landscape Hhs
 
Remixing Public Health: Tools for Public Health Innovation
Remixing Public Health: Tools for Public Health InnovationRemixing Public Health: Tools for Public Health Innovation
Remixing Public Health: Tools for Public Health Innovation
 
Safecast long version oct 2015
Safecast long version oct 2015Safecast long version oct 2015
Safecast long version oct 2015
 

Similar to Social Media as a Record for Public Services and Utilities in a Disaster

Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsOptimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsJames Embleton-Forrest, BA, MCGI
 
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)Twittercrisis
 
No Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media MonitoringNo Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media Monitoring
Tamer Hadi
 
SPEAK Social media and crisis communication during cascading disasters, Elisa...
SPEAK Social media and crisis communication during cascading disasters, Elisa...SPEAK Social media and crisis communication during cascading disasters, Elisa...
SPEAK Social media and crisis communication during cascading disasters, Elisa...
Global Risk Forum GRFDavos
 
Climate Action Hackathon
Climate Action HackathonClimate Action Hackathon
Climate Action Hackathon
Greg Benchwick
 
Public deck
Public deckPublic deck
Public deck
Michael Klein
 
New media: Potential for the ICRC
New media: Potential for the ICRCNew media: Potential for the ICRC
New media: Potential for the ICRC
Sanjana Hattotuwa
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Corey Olszewski
 
Social Media in Government
Social Media in GovernmentSocial Media in Government
Social Media in Government
Judith A Newton
 
Effective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications PlanningEffective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications Planning
Carol Spencer
 
Social Media Survival Guide for Public Safety
Social Media Survival Guide for Public SafetySocial Media Survival Guide for Public Safety
Social Media Survival Guide for Public SafetyBrett Hicks
 
Utilize Digital and Social Media Data to Inform Your Research in Novel Ways
Utilize Digital and Social Media Data to Inform Your Research in Novel WaysUtilize Digital and Social Media Data to Inform Your Research in Novel Ways
Utilize Digital and Social Media Data to Inform Your Research in Novel Ways
Katja Reuter, PhD
 
Effective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications PlanningEffective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications Planning
Carol Spencer
 
Signal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementSignal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency management
Intergen
 
How Social Media is Shaping Disaster Response
How Social Media is Shaping Disaster ResponseHow Social Media is Shaping Disaster Response
How Social Media is Shaping Disaster Response
Dell Services
 
Models of Social Media Adoption in Australian Emergency Management Organisations
Models of Social Media Adoption in Australian Emergency Management OrganisationsModels of Social Media Adoption in Australian Emergency Management Organisations
Models of Social Media Adoption in Australian Emergency Management Organisations
Judith A Newton
 
OCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergenciesOCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergencies
Jan Husar
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
contentli
 
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
jeffsrosalyn
 

Similar to Social Media as a Record for Public Services and Utilities in a Disaster (20)

Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsOptimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
 
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
Social Media in Public Safety Microsoft Worldwide Public Safety Symposium (PSS)
 
No Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media MonitoringNo Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media Monitoring
 
SPEAK Social media and crisis communication during cascading disasters, Elisa...
SPEAK Social media and crisis communication during cascading disasters, Elisa...SPEAK Social media and crisis communication during cascading disasters, Elisa...
SPEAK Social media and crisis communication during cascading disasters, Elisa...
 
Climate Action Hackathon
Climate Action HackathonClimate Action Hackathon
Climate Action Hackathon
 
Public deck
Public deckPublic deck
Public deck
 
New media: Potential for the ICRC
New media: Potential for the ICRCNew media: Potential for the ICRC
New media: Potential for the ICRC
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
 
Social Media in Government
Social Media in GovernmentSocial Media in Government
Social Media in Government
 
Effective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications PlanningEffective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications Planning
 
Social Media Survival Guide for Public Safety
Social Media Survival Guide for Public SafetySocial Media Survival Guide for Public Safety
Social Media Survival Guide for Public Safety
 
Social Media for the Meta-Leader
Social Media for the Meta-LeaderSocial Media for the Meta-Leader
Social Media for the Meta-Leader
 
Utilize Digital and Social Media Data to Inform Your Research in Novel Ways
Utilize Digital and Social Media Data to Inform Your Research in Novel WaysUtilize Digital and Social Media Data to Inform Your Research in Novel Ways
Utilize Digital and Social Media Data to Inform Your Research in Novel Ways
 
Effective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications PlanningEffective Whole Community Digital Communications Planning
Effective Whole Community Digital Communications Planning
 
Signal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency managementSignal - social media, considerations for public safety and emergency management
Signal - social media, considerations for public safety and emergency management
 
How Social Media is Shaping Disaster Response
How Social Media is Shaping Disaster ResponseHow Social Media is Shaping Disaster Response
How Social Media is Shaping Disaster Response
 
Models of Social Media Adoption in Australian Emergency Management Organisations
Models of Social Media Adoption in Australian Emergency Management OrganisationsModels of Social Media Adoption in Australian Emergency Management Organisations
Models of Social Media Adoption in Australian Emergency Management Organisations
 
OCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergenciesOCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergencies
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Social Media as a Record for Public Services and Utilities in a Disaster

  • 1. Social Media as a Record for Public Services and Utilities in a Disaster How Government and Public Utilities used Social Media during “Post-Tropical Cyclone” Sandy
  • 2. People Like Social Media Pew Research Center’s Internet & American Life Project • 65% of adult internet users now say they use a social networking site like MySpace, Facebook or LinkedIn. (2011) • 74% of smartphone owners use their phone to get real-time locationbased information. (2012) • Some 15% of online adults use Twitter. (2012) Dartmouth Survey: Social Media Use by Fortune 500 Companies • 73% of Gas and Electric Utilities (16 of 22) used Twitter, 50% used Facebook, and 27% hosted a blog. (2012) Red Cross Survey (July 2010) • Social media sites ranked fourth as a resource for emergency information behind television news, radio and online news sites • One in five would try to contact responders through a digital means such as e-mail, websites or social media • Nearly half believe a response agency is probably already responding to any urgent request they might see
  • 3. Social Media can be a Record “Made or received by an organization in pursuance of legal obligations or in the transaction of business” — ARMA However “The scope of discovery of electronically stored information does not depend on the internal designation or records classification that may or may not have been assigned to it. Any electronically stored information, whether or not it is internally viewed as of business, legal, regulatory, or personal value, is potentially discoverable.” — The Sedona Conference
  • 4. Social Media Policy AIIM International • Integrate social media into an organization’s existing governance policy. • Policy should be “channel-neutral”. Patricia Franks, San Jose State University SLIS • Guided by the Generally Accepted Recordkeeping Principles. • Create a crosswalk between the existing records retention schedule and records generated through social media.
  • 5. Sample from Patricia Franks RACO 2011 Presentation: “How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”
  • 6. Social Media and Sandy Disasters = Unique Communication Environment Time-Sensitive: Little time for reflection, open debate, rebuttals Suppression: No longer an option Counter • Outdated, inaccurate, or false information • Malicious use Provide • “Expand the use of newer technologies to communicate with customers during outages (i.e. email, text messaging, and social media).” — Utility Performance Report Following Hurricane Irene and Tropical Storm Lee NYS Public Service Commission, June 2012
  • 7. Social Media and Sandy Six Categories of Social Media Use in a Disaster • Public safety and crisis information disseminated before, during, and after various incidents; • Notifications for training or mobilizing first responders; • Sending emergency warnings and alerts; • Gaining situational awareness and utilizing multi-directional communications; • Responding to requests for assistance; • Aiding in recovery efforts. Social Media and Disasters: Current Uses, Future Options, and Policy Considerations, Congressional Research Service, Sept. 2011
  • 8. Social Media and Sandy Public safety and crisis information disseminated before, during, and after
  • 9. Social Media and Sandy Public safety and crisis information disseminated before, during, and after
  • 10. Social Media and Sandy Sending emergency warnings and alerts
  • 11. Social Media and Sandy Responding to requests for assistance
  • 12. Social Media and Sandy Direct message responses to requests for assistance and privacy issues
  • 13. Social Media and Sandy Gaining situational awareness and utilizing multi-directional communications
  • 14. Gaining situational awareness and utilizing multi-directional communications + Responding to requests for assistance
  • 15. Social Media and Sandy Gaining situational awareness and utilizing multi-directional communications (in a not good way)
  • 16. Social Media and Sandy Aiding in recovery efforts
  • 17. Social Media and Sandy Not Aiding in recovery efforts with incomplete information 3 Days Apart
  • 18. Social Media and Sandy Notifications for training or mobilizing first responders (not really this time)
  • 19. Social Media and Sandy GARP Accountability and Transparency • Documented and approved social media policy or that social media is included in a “channel-neutral” communications policy or internet policy. • Tool-specific and sector-specific procedures. • Have print copies of policy and procedures at backup site. • Specify who will manage social media accounts during a disaster and train them on special case usage.
  • 20. Social Media and Sandy GARP Integrity and Protection • Clearly link identity to the organization and comply with the social media/communications policy • Ensure protection of data by updating data maps of the physical locations of all electronically stored records • Vet the reliability of any third party vendor • Alternative channels if platform goes down • Keep account in the hands of appropriate users and avoid malicious hijacking
  • 21. Social Media and Sandy GARP Compliance • Maintain records in keeping with company policy, applicable local, state, or federal laws as well as any industry regulations. • Evaluate the risks and benefits of channel silence on an issue.
  • 22. Social Media and Sandy GARP Availability, Retention, and Disposition • Evaluate services for capture, indexing, and retrieval (ArchiveSocial, Next Point CloudPreservation, Hanzo Archives) • Evaluate appropriate posting tools (Hootsuite, Radian 6) • Limits of control over third-party software: What if needed for longer than the terms of service allows? What if records should not exist as long as services maintain?
  • 23. Resources • Franks, Patricia “How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools” IBM Center for The Business of Government, 2012 • Lindsay, Bruce “Social Media and Disasters: Current Uses, Future Options, and Policy Considerations” Library of Congress, Congressional Research Service, Sept. 6, 2011 • Redgrave, Jonathan “The Sedona Principles (Second Edition)” The Sedona Conference, June 2007 • “Best Practices Study of Social Media Records Policies” ACTIAC Collaboration & Transformation (C&T) Shared Interest Group (SIG), March 2011