recommended reading

Saving Government Tweets Is Tougher Than You Think

Al Mueller/

Federal agencies should establish working groups to determine when agency social media posts constitute federal records and how to retain them for posterity, according to new draft guidance from the National Archives and Records Administration.

The working groups should monitor how agencies are retaining posts on social media sites they currently use and help agencies make smart decisions before beginning to use new social sites, the guidance said.

The working groups should include “records management staff, Web managers, social media managers, information technology staff, privacy and information security staff, and other relevant stakeholders,” according to the Archives bulletin.

The guidance, which was published Wednesday, is open for comments until July 12, according to an Archives blog post.

The government has struggled mightily as the technology for creating and sharing documents sometimes outpaces its capacity to store those documents in a way that meets its statutory obligations. Some agency records don't need to be turned over to the National Archives until 30 years after they were produced, a delay that can represent many generations of digital technology.

Social media presents an even thornier challenge because the posts live on a third party’s computer servers rather than on the government’s own.

The draft guidance retains the basic principles from a 2010 Archives bulletin, which noted that most government social media posts are federal records and must be retained for varying time periods depending on how important they are for understanding government policies and decision making.

Both documents urge agencies to adopt terms of service agreements whenever possible that specify social media platforms will retain all the agency’s posts and provide them to the agency upon request or if the site goes out of business or is bought out.

If adopting those terms of service isn’t possible, the agency should develop a method to retain its own posts, the guidance said. Those methods could include using Web crawling software to create local versions of the site, using Web capture tools to transfer posts to another format such as text files, or using application programming interfaces or platform-specific tools to pull the content. 

(Image via Al Mueller/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.