Social media has largely been cited as a boon for DR communication. However, social media, by definition, is outside of corporate control. What are the risks of using social media for communication during and following a disaster?
While it's widely acknowledged that social media is an effective and almost instantaneous way to communicate to large numbers of people, there are also risks. Perhaps the most important risk from social media is sending inaccurate or misleading information about the event. It's a good idea for organizations to enact social media use policies, mostly to prevent the release of unauthorized, inaccurate or possibly damaging information.
If social media is being used inside an office, and an incident occurs, rules for its use by employees should be in place and activated immediately. Coordinated use of social media by emergency response teams can be an effective way to disseminate alert messages to others. But it must be remembered that many parties can receive these messages. Such a blizzard of messages could hamper first responders and other organizations because the information they disseminate is inaccurate or misleading.
A social media policy for DR communication should stipulate who is authorized to send messages relating to an incident, the nature of the messages' content, and the frequency of their dissemination.
The traditional media -- reporters and television crews -- is always eager to receive social media messages that include photos, videos and text messages that provide eyewitness information on an event -- especially if they are unable to get past police lines or other restrictions. Again, unauthorized release of such messages to the media can damage an organization's reputation.
Dig Deeper on Disaster recovery planning - management
Related Q&A from Paul Kirvan
Archiving email is crucial to the business continuity and disaster recovery process. For example, consider how cybersecurity and cloud storage can ... Continue Reading
Your organization should integrate its cybersecurity and backup processes. It's easy for a cyberattack to affect backups, unfortunately, so be ... Continue Reading
Many on-site and cloud-based services are available for small to medium-sized business backup. Pay particular attention to the deciding factors for ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.