Difference between revisions of "Next Steps: Social Media for Emergency Response"
From LINKS Community Center
(13 intermediate revisions by 3 users not shown) | |||
Line 6: | Line 6: | ||
|Target Audience=Policy Makers, Practitioners | |Target Audience=Policy Makers, Practitioners | ||
|Status=Published | |Status=Published | ||
− | + | |Covers Thematic=Community management, Legal/Standards, Social Media Strategy, Technologies | |
− | |Covers Thematic=Community management | ||
|Audience Experience Level=Starter | |Audience Experience Level=Starter | ||
|Source Website=https://www.ghinternational.com/docs/DHS_VSMWG_Next_Steps_Social_Media_Strategy_Formatted_May_2013_FINAL.pdf | |Source Website=https://www.ghinternational.com/docs/DHS_VSMWG_Next_Steps_Social_Media_Strategy_Formatted_May_2013_FINAL.pdf | ||
− | | | + | |Synopsis=The '''purpose of this document ''' |
+ | |||
+ | *Provide guidance to public safety agencies developing social media strategies and programs | ||
+ | *Discuss challenges and considerations related to social media specific for agency use | ||
+ | *Provide best practices and policy examples for inclusion in agency strategies | ||
+ | |||
+ | |||
+ | Some things to '''consider when developing policies ''' | ||
*Human Resources | *Human Resources | ||
− | **Resources required | + | **Resources required |
− | **Training and education required | + | **Training and education required |
− | **Job descriptions | + | **Job descriptions |
− | **Liability | + | **Liability |
− | **Ethical conduct and accountability to an agency’s rules of conduct | + | **Ethical conduct and accountability to an agency’s rules of conduct |
+ | ***personal versus professional use of social media tools and technologies | ||
*Operational and Communications Security | *Operational and Communications Security | ||
**Classification and handling guidelines | **Classification and handling guidelines | ||
− | *** | + | *** eg., For Official Use Only, Sensitive But Unclassified, Classified |
− | **Training and education | + | **Training and education |
− | **Devices | + | **Devices |
− | **Integration with existing tools and processes | + | ***e.g., personal versus agency-provided, etc. |
+ | **Integration with existing tools and processes | ||
*Legal and Compliance | *Legal and Compliance | ||
− | **Copyright laws | + | **Copyright laws |
− | **Records retention requirements | + | **Records retention requirements |
− | **Endorsement of products, services, and postings | + | **Endorsement of products, services, and postings |
− | **Public disclosure and Sunshine laws | + | **Public disclosure and Sunshine laws |
**Privacy. | **Privacy. | ||
*Business Continuity | *Business Continuity | ||
− | **Necessary access rights and password policies | + | **Necessary access rights and password policies |
− | **Redundancies | + | **Redundancies |
*Information Technology | *Information Technology | ||
− | **Bandwidth and other resources (servers, etc.) | + | **Bandwidth and other resources (servers, etc.) |
− | **Training and education | + | **Training and education |
**Integration. | **Integration. | ||
*Communications and Engagement | *Communications and Engagement | ||
**Messaging; | **Messaging; | ||
− | **Metrics and measuring success | + | **Metrics and measuring success |
− | **Outreach | + | **Outreach |
+ | |||
+ | |||
+ | '''Implementation''' | ||
There are several steps to adopting new technologies and methodologies, each of which require careful consideration and planning. | There are several steps to adopting new technologies and methodologies, each of which require careful consideration and planning. | ||
These include the following: | These include the following: | ||
− | * Choosing the right technology and applications | + | * Choosing the right technology and applications |
− | * Strategy, policy, and procedure development | + | * Strategy, policy, and procedure development |
− | * Setting and managing expectations | + | * Setting and managing expectations |
− | * Engaging the community | + | * Engaging the community |
− | * Managing misinformation | + | * Managing misinformation |
* Addressing challenges to adoption, including concerns related to | * Addressing challenges to adoption, including concerns related to | ||
**privacy | **privacy | ||
Line 59: | Line 70: | ||
** human resources | ** human resources | ||
** information technology | ** information technology | ||
− | ** security | + | ** security |
|Is Archived=No | |Is Archived=No | ||
− | | | + | |Disaster Management Phase=Before |
− | |||
− | |||
}} | }} | ||
− |
Revision as of 18:53, 6 January 2023
Created: 27 January 2022
Last edited: 2 August 2023
Last edited: 2 August 2023
Quick Facts
Publishing Organisation:
Science and Technology Directorate of the United States Department of Homeland SecurityYear:
2012Primary Target Country:
United States of AmericaLanguages:
EnglishStatus:
PublishedCovers Thematic
Target audience
Audience experience level
Disaster Management Phase
Synopsis
The purpose of this document
- Provide guidance to public safety agencies developing social media strategies and programs
- Discuss challenges and considerations related to social media specific for agency use
- Provide best practices and policy examples for inclusion in agency strategies
Some things to consider when developing policies
- Human Resources
- Resources required
- Training and education required
- Job descriptions
- Liability
- Ethical conduct and accountability to an agency’s rules of conduct
- personal versus professional use of social media tools and technologies
- Operational and Communications Security
- Classification and handling guidelines
- eg., For Official Use Only, Sensitive But Unclassified, Classified
- Training and education
- Devices
- e.g., personal versus agency-provided, etc.
- Integration with existing tools and processes
- Classification and handling guidelines
- Legal and Compliance
- Copyright laws
- Records retention requirements
- Endorsement of products, services, and postings
- Public disclosure and Sunshine laws
- Privacy.
- Business Continuity
- Necessary access rights and password policies
- Redundancies
- Information Technology
- Bandwidth and other resources (servers, etc.)
- Training and education
- Integration.
- Communications and Engagement
- Messaging;
- Metrics and measuring success
- Outreach
Implementation
There are several steps to adopting new technologies and methodologies, each of which require careful consideration and planning.
These include the following:
- Choosing the right technology and applications
- Strategy, policy, and procedure development
- Setting and managing expectations
- Engaging the community
- Managing misinformation
- Addressing challenges to adoption, including concerns related to
- privacy
- public comment
- record retention
- public disclosure
- health information
- human resources
- information technology
- security
Linked to
- Technologies
- Use Cases
-
None. See all Technologies.
- None. See all Use Cases.