|
||||||||||||||
Getting Through: Using E-Mail and IM in a Disaster |
||||
|
Standard communications methods can fail during natural and manmade events. However, as recent events have shown, alternatives such as e-mail, two-way paging and instant messaging may help get your messages through. |
|||
|
Bottom Line
|
|||
|
|
|||
|
Key Issue
Which best practices are critical for building and supporting the e-workplace? |
|||
|
Tactical Guidelines
Be prepared to leverage e-mail, instant messaging and Web sites in the event of an emergency. |
|||
|
Many communications methods can fail during a disaster: Landline telephone and therefore fax service may be interrupted; wireless transmitters may be destroyed; data lines may be disrupted. Communication is, of course, critical during a disaster, and enterprises must therefore employ every available communications path. One of the most important of these paths is the Internet. Although it relies to some extent on telecommunication facilities, the way messages are routed makes the continued functioning of the Internet less dependent on a single enterprise, carrier or geographic area than other means of communication. Enterprises must therefore consider the Internet an integral not optional business communications medium. Internet-based means of communications e.g., e-mail, instant messaging (IM) and Web sites enable real-time or near-real-time information exchange when voice and fax communications have failed. For this reason, enterprises must be prepared to leverage these technologies in the event of an emergency. Technology Internet-based messaging systems take advantage of the flexible routing capabilities of TCP/IP, but the implementation may limit them. If the routing of a message requires access to or passage through a single node, that node may become a single point of failure. The design of the implementation should take this problem into account and provide for possible outages at key routing points. Alternatives may include another path using the same medium (e.g., a shadow site that takes over during an outage) or another medium (e.g., IM in place of e-mail). Just as physical facilities have fire drills, IT operations should have disaster drills to test backup systems and ensure that staff understand their responsibilities in an emergency situation. All staff should be advised as to what procedures to follow in the event that systems fail:
At the outset of an emergency, the IS organization should quickly assess which systems and links are operational and, if necessary, reinforce the performance and capacity of each Internet-based system. Throughout the emergency, Internet systems should be continually monitored for degradation caused by service interruptions or traffic surges. If bandwidth becomes constrained, for example, nonessential applications should be taken offline for the duration of the emergency. If communication paths become flooded, nonessential communications should be limited so that critical communications are not compromised. Even highly secure communications needs can be met over an inherently insecure infrastructure, as long as measures are taken to encrypt or otherwise protect the content. If secure communication is essential, emergency plans should provide for encryption or encoding of communications via nonsecured channels. Business Practices Enterprises must implement a strategy that will enable them to account for all personnel whether on- or off-site employing all available communications media. This strategy will require the integration of disparate message streams; administrative personnel and procedures must therefore employ special handling procedures to eliminate gaps or redundancies when the information is aggregated. Enterprises should also expect to be called on to provide relay services and to act as communication-forwarding points for people personnel and their loved ones, emergency personnel, even complete strangers who may be in need of assistance. Many enterprises have communities of users who communicate via one or more of the most popular consumer IM systems, e.g., AOL Instant Messenger, ICQ or MSN Messenger. IM is often installed by users without the permission of their enterprises, which sometimes are uncomfortable with consumer-oriented IM due to its lack of manageability. Despite enterprise concerns, IM can provide an essential method of real-time Internet communications in the event of an emergency. Enterprises should collect employees' IM screen names for addition to corporate directories (though, like home telephone numbers, they do not need to be publicly viewable). IM transmissions effectively leverage the TCP/IP infrastructure, but they also require access to a hub node where the screen names are resolved to a TCP/IP address. This central hub then becomes the critical resource. Bottom LineThe Internet is a lifeline for business communications one that may continue to work when others do not. Enterprises must develop business and technology processes for integrating Internet and other communications systems, so that lives and property can be protected in circumstances where reaction time is the ultimate luxury. |
|||
|
This research is part of a set of related research pieces. See AV-14-5238 for an overview. |
|||
|
Entire contents © 2001 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
Resource ID: 340984 |
||