Author: Lucien Canton

Social Media: Coordinate your message

"Please be advised of a potential BART disruption at the Civic Center Station between 4:30 – 7:30p.m. this evening."
This was the text message I received on my Droid about 4:32 yesterday from the San Francisco Department of Emergency Management. You'll note that it doesn't tell me why there is a potential disruption and what the effect would be. Since a friend and I had plans to attend a concert in Oakland last night and were planning to use BART, I sent a text asking if this disruption affected just the station or if it would cause system delays. I'm still waiting for the response.
I then went to BART's Facebook page – nothing. Ditto on their Twitter site. I went to the SF DEM's Facebook page – nothing. I finally found a note on BART's website advisory page about a 10 minute system delay and a suggestion that I sign up for various notification services or follow updates on their Twitter site. We drove to the concert.
The disruption was caused by demonstrators protesting a recent police shooting at the Civic Center Station. The disturbance eventually caused major system delays. But you had to go to news media sites to find this out. By the way, this morning I found that BART has a second Facebook site that would have answered my questions.
So what can we learn from this?
  1. A text message is not exempt from the normal rules for crisis communications: don't just tell me what - tell me why, how it will affect me, and what I should do about it.
  2. If you're going to use social media, monitor it and respond to queries. It's a conversation, not a newswire.
  3. Your message should include links to more detailed information. You can't say it all in 144 characters and multiple messages don't cut it.
  4. If you have more than one social media outlet, coordinate the release of information across all platforms.
  5. Either provide updates or provide options for updates as the situation changes.

 

Public Relations Faux Pas: Yet another TSA lesson in crisis communications

By now you have probably heard about the Nigerian man who succeeded in boarding a Virgin America flight from New York to Los Angeles using an expired boarding pass in another person's name. According to news reports, the man was briefly detained by the FBI on landing and released. He was arrested several days later trying to board a Delta flight to Atlanta using the same method.

One could blog for several days on all the things that went wrong but I'm always more interested in how organizations respond to mistakes than in the mistake itself. In this case, TSA freely admits that "…TSA did not properly authenticate the passenger’s documentation." They further promise, "…disciplinary action is being considered for the security officers involved and all appropriate actions will be taken." 

Accepting responsibility for your mistake and promising corrective action is always a good crisis communication move. However, TSA then proceeds to blow it by trying to minimize the problem by saying, "…it’s important to note that this individual received the same thorough physical screening as other passengers, including being screened by advanced imaging technology…" In other words, "we screwed up but it didn't really matter."

One can certainly make the case that a layered security approach is designed to compensate for mistakes in any one part of the system. There is no doubt that the individual was identified by the flight crew and reported to the FBI. But this occured after he had boarded the aircraft in response to passenger complaints about his body odor.

TSA has a fairly well publicized record of failing its own tests and for letting knives, pistols and box cutters slip through the "thorough physical screening" provided by its officers. (They have, however, confiscated my empty 4 ounce aftershave bottle and numerous one inch Swiss Army knives I forgot to leave at home.) To say that this man posed no threat simply because he went through the same screening process as other passsengers is a bit disingenuous.

The lesson here? Acknowledge mistakes and promise corrective action by all means. But don't try to defend yourself in a crisis by underestimating people's intelligence and relying on a reputation that is disputed by your past actions.

RFP: Why It’s a Bad Idea

It's been a busy few weeks around here, as you may have guessed. Like many consultants I was doing the paper chase – submitting proposals for potential projects. I swore last year that I wouldn't do it again – the chance of winning versus the level of effort required just isn't worth it. But there I was doing it again at the request of a good friend. We came close – had an awesome team assembled and a reasonable 100 page proposal done in less than a week. Even made it to the orals. Then the client decided to pull the RFP.

As I was reminding myself of why I don't do RFPs I came across an article by Michael McLaughlin on Rain Today entitled Why You Should Ignore that RFP. McLaughlin points out that the process is flawed because most RFPs require that you accept that the client's diagnosis of their problem is correct. Without significant one-on-one contact, you really have no way of knowing if this true. The result is that "…the client receives a stack of mediocre proposals to solve an unconfirmed problem."

This has been my experience as well and was part of the reason our potential client was not happy with the proposals submitted by the finalists. In my proposals I always try to develop a statement of the problem and this is sometimes extremely difficult to do. What's more interesting is that a lot of the time the client can't articulate their problem or tell me how solving it would benefit their organization.

So may I suggest that those of you who are still seeking services through the RFP process consider other alternatives? At least read my article Stop Throwing Your Money Away: Eight Tips for Improving Your RFP. Meanwhile, I'm taping McLaughlin's article someplace where I can re-read it next time I'm tempted to respond to an RFP.

National Academy Reports/Books Available as Free Download

Just received this from my colleague, Claire Rubin, who writes the Recovery Diva blog:

As of June 2, 2011, all PDF versions of books published by the National Academies Press (NAP) will be downloadable free of charge to anyone. This includes the current catalog of more than 4,000 books plus future reports published by NAP.

This is a really fantastic deal for those of you who are interested in hard research on a variety of issues. Of particular interest to my readers will be the section on natural hazards in the Earth Sciences category and the category on Conflict and Security and Security issues.

And while you're at it, check out Claire's blog. It's always worth reading!

Crisis Communications: Why don’t they listen to me?

I was reading an article on the recent tornado in Missouri and was struck by the comment of one of the victims. He talked of how they had heard the warning sirens and had gone outside to look but saw nothing so they took no action. When the sirens sounded a second time, it was too late for him to seek shelter.

Unfortunately, this is not uncommon. I've blogged elsewhere about the hesitation of local officials to sound warnings but it's worth noting that even when they do so in a timely manner, the public doesn't always react. We've got a considerable amount of research showing that people no longer trust official warnings. Instead, they seek verification from other sources, usually within their circle of family and friends.

The lesson for crisis communicators is obvious. We can't assume that because our message has been released through the media that people will act on it. Instead, we need to make sure we are using multiple sources, especially those used by people to communicate with each other. We need to be part of the conversation.

Crisis communications: what do social media and jazz have in common?

Several years ago my brother treated me to a jazz concert. I remember being incredibly disappointed in how bored I was (even fell asleep). He, being an aficionado, thoroughly enjoyed himself. In the discussion that followed, I realized two things.  The first was that jazz is esoteric – you need to have an understanding of what's going on to truly appreciate it. The second was that I really didn't like jazz and that what I thought was jazz was really the blues.

What's this got to do with social media? As I spend more time learning about social media, I'm beginning to realize that Twitter is a lot like jazz – it's pretty hard to appreciate it if you don't take the time to understand it. The aficionados think it's the best thing since sliced bread while the rest of us scratch our heads trying to decipher twitter-speak and figure out how to use a hash tag. Secondly, once you do begin to understand it, you begin to learn its limitations and find it may not really be what you're looking for to solve your crisis communications problems.

My point is that not all of us are going to take the time to learn the intricacies of jazz and, even if we do, we may not like it. The same is true of Twitter. It's a great tool for some but is not the answer for all. Let's continue to keep diversity in our crisis communications.

Cloud computing and business continuity

Data is a fragile thing and poses a major Achilles heel to any business. Consequently, we're always looking for ways to better safeguard data. One idea that's been gaining considerable traction lately is cloud computing – the placing of processes and data onto the Internet. This means that a disaster at your site won't affect your IT operation and you can quickly resume business if you can gain Internet access.

However, as with any new technology, we still don't fully understand the risks of cloud computing and may well be exchanging one set of problems for another. This morning Amazon's Elastic Cloud Compute (EC2) service failed, bringing down a whole lot of businesses and services that use EC2. Apparently, EC2 is run out of a single data center in Virginia.

The lesson here is that you need to know whether your backup plan has its own backup. Have you just created a situation where you now have to worry about disasters in two locations? You should demand at least the same level of backup at the vendor site that you would have put in place at your site. After all, trying to mitigate disaster by adding a single point of failure to your backup plan doesn't really make sense, does it?