Government Technology

Messaging System Links Texas Residents and Officials During Emergencies


Hurricane Ike struck in 2008, damaging or destroying every house on this street, which runs along Galveston Bay. Courtesy of Greg Henshall/FEMA.
Hurricane Ike struck in 2008, damaging or destroying every house on this street, which runs along Galveston Bay. Courtesy of Greg Henshall/FEMA.

May 6, 2010 By

Photo: Hurricane Ike struck in 2008, damaging or destroying every house on this street, which runs along Galveston Bay. Courtesy of Greg Henshall/FEMA.


The Alvin, Texas, public library was to be the voting site for a city election on April 28, but a two-alarm fire earlier in the morning forced officials to move voting to City Hall. The transition went smoothly, thanks to the city's community notification system that was already in place.

"The particular area where the early voting was talking place suffered smoke damage, so we had to move the early voting to City Hall," said Capt. Terry Lucas, the city's emergency management coordinator. The fire and resulting movement of voting demonstrated one of many uses for the notification system.

Alvin has had the system, known as Connect-CTY from Blackboard Connect, in place for two and a half years. The first major use of the system came as Hurricane Ike approached. During the response to the hurricane, Lucas sent 50 messages warning residents of the storm's approach and informing them of the city's preparations. Once Ike made landfall, Lucas sent messages letting residents know where and when they could pick up emergency supplies and meet with FEMA representatives.

In addition to notifications during emergencies, the city uses the system to inform residents of public hearings, street closures, city events and missing children.

Read more about Alvin's mass notification system at Emergency Management's website.

 


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
Fresh Ideas In Online Security for Public Safety Organizations
Lesley Carhart, Senior Information Security Specialist at Motorola Solutions, knows that online and computer security are more challenging than ever. Personal smartphones, removable devices like USB storage drives, and social media have a significant impact on security. In “Fresh Ideas in Online Security for Public Safely Organizations,” Lesley provides recommendations to improve your online security against threats from social networks, removable devices, weak passwords and digital photos.
View All

Featured Papers