Social Media and Live Broadcast Video Records

Facebook announced an update regarding their Live Video storage policy three weeks ago. Beginning on February 19th, any new live broadcasts can be replayed, downloaded or shared from Facebook Pages or profiles for 30 days. After 30 days, these live broadcasts will automatically be removed from Facebook. Any archived live videos older than 30 days will be removed from Facebook after 90 days. Before the deletion of these videos, Facebook will notify you via email and through the Facebook app informing you that you will have 90 days to download or transfer your live broadcast videos.

To ensure that these live video broadcasts are preserved, you will have the opportunity to download the live broadcast videos to your device, transfer them to your cloud storage, or convert them to a new reel. Facebook provides directions on the various ways to do these procedures. Updating Our Facebook Live Video Storage Policy | Meta

According to this announcement, Meta is making these changes to align with their storage policies with industry standards and to help ensure that Meta is providing the most up-to-date live video experiences for all on Facebook.

This is a concern for several reasons:

1. Social media companies control how long these potential records will be available in a social media platform.

2. Potential government agencies that use Facebook Live video broadcasts (especially during the pandemic) could lose records of the office unless they start downloading the videos now. This could result in more electronic records needing to be stored on government servers, which will increase storage space/cost money to preserve.

If you are an entity that uses Facebook live video broadcasts and has a social media archiving software program, i.e., – ArchiveSocial, research if these live broadcasts are being captured and preserved permanently. If you do not have an archiving social media software program that preserves these records, begin a plan on how your entity will start preserving these records incrementally.

Yes, Email Can Be an Official Record

As the State of Ohio begins its 136th General Assembly of the Ohio Legislature, the Ohio Electronic Records Committee would like to remind newly elected State Legislators of our Email Management Online Training Series. Training courses include Email As A Record; Email Clean-Up Strategies; Email Filing and Organization; and Microsoft 365 Outlook Email Management.

In these online courses, one will learn several things including, that “email itself is not a record series but should be retained based on the content of the message.” If the email serves as a record that “documents the organization, functions, policies, decisions, procedures, operations, or other activities of the office,” [ORC 149.011(G)] then it needs to be retained. Examples of records in email format can include: correspondence, personnel documentation, or project working papers. Often emails have attached documents with them. This training series helps one determine what is necessary to keep (email, email and attachment, or just the attachment) for different circumstances.

The amount of email one receives can be quite overwhelming. The Email Clean-Up and Email Filing and Organization training courses are both helpful and informative and can guide one through this difficult process in an efficient manner. Lastly, many governmental bodies, organizations, and businesses are now switching to Microsoft 365 Outlook Email. Steps for applying retention rules for Microsoft 365 Outlook emails are demonstrated using desktop and web applications in the training program, Microsoft 365 Outlook Email Management.

Please take some time to review these very informative courses. Good luck as you begin your endeavor in email management.

Ransomware Can Hold Your Records “Hostage”

In another unfortunate trend for Ohio in 2024, Wood County had experienced a ransomware attack that has prevented them from accessing their electronic records management system. As seen in the article found here, while the attack is not impacting public services, the county is resorting to using pen and paper to record emergency calls as well as preventing them from accessing historical police records.

Just like water or a fire damaging paper records, your electronic records are vulnerable to disasters and disruptions to business like these cyberattacks. There are several things your office should keep in mind:

  1. Understand where your records are on your network as well as who has permission to those files. ARMA International has a great article on defining data maps found here. This will also help identify where your vital records are, those records integral to your business operations and should be recovered quickly.
  2. Have your IT routinely backup your electronic records as well as run updates to system software/antiviruses/network firewalls.
  3. Provide mandatory cybersecurity training to your office staff to educate them on identifying fraudulent requests and the steps to report on them.
  4. Clean up electronic records that have met their applicable records retention schedules and are no longer needed. The less files there are on your network, the less files that could be potentially stolen from your office.
  5. Finally, establish continuity of operations plan (COOP) in place to define the policies and procedures to respond to an emergency or disaster. Have a COOP plan in place will allow a swifter restart of your operations. FEMA has a brief brochure describing a COOP plan found here.