Jump to content

Runbooks: Difference between revisions

From Archive
Rewriting with concrete, actionable emergency procedures instead of abstract concepts
Updated main runbooks page to link to individual detailed procedures
 
Line 1: Line 1:
'''Runbooks''' are field-tested emergency procedures designed for independent journalists and field workers who operate alone, often in remote locations with limited connectivity.
'''Runbooks''' are field-tested emergency procedures designed for independent journalists, field workers, and anyone operating alone in remote locations. Each runbook provides step-by-step protocols that can be executed under stress.
 
The system separates sensitive information storage (handled by password managers) from actionable procedures that can be executed under stress.


== Core Emergency Runbooks ==
== Core Emergency Runbooks ==


=== Motorcycle/Vehicle Down ===
=== [[Vehicle Failure Runbook]] ===
'''If your primary transportation fails in the field:'''
Complete procedures for handling transportation breakdowns during field operations, including safety assessment, damage evaluation, insurance procedures, alternative transportation, and work continuity planning.


# '''Immediate Safety''': Move to safe location, assess injuries, activate hazard lights
=== [[Digital Security Incident Runbook]] ===
# '''Evidence Collection''': Photo damage from multiple angles, note exact location coordinates, document weather/road conditions
Comprehensive response protocols for account compromises, device theft, and system access loss, covering immediate isolation, account recovery, source protection, and system restoration.
# '''Damage Assessment''': Can vehicle be operated safely? Is towing required? Are key systems damaged?
# '''Insurance Activation''': Contact insurance carrier, file claim, arrange towing if needed
# '''Alternative Transport''': Activate backup transport plan, coordinate pickup, secure equipment
# '''Story Continuity''': If on assignment, notify editor/client of situation and revised timeline


=== Digital Security Breach ===
=== [[Solo Medical Emergency Runbook]] ===
'''If accounts are compromised or you're locked out of systems:'''
Emergency medical procedures for serious illness or injury when working alone, including self-assessment, emergency response, evacuation procedures, and work continuity measures.


# '''Immediate Isolation''': Disconnect compromised devices from network, activate airplane mode
=== Equipment Theft/Loss Runbook ===
# '''Alternative Access''': Use pre-configured backup device or secure location to access accounts
''(Planned - procedures for securing systems after equipment theft, insurance claims, replacement workflows, and maintaining operational security)''
# '''Account Recovery''': Follow predetermined recovery sequences for critical accounts (email, cloud storage, publishing platforms)
# '''Source Protection''': Secure sensitive communications using offline methods, warn sources if necessary
# '''System Restoration''': Remote wipe compromised devices, restore from known-good backups
# '''Communication Fallback''': Activate alternative communication channels with editors/contacts


=== Medical Emergency While Solo ===
=== Legal/Detention Runbook ===
'''If injured or seriously ill while working alone:'''
''(Planned - protocols for arrest situations, legal representation, communication restrictions, and professional obligations during detention)''


# '''Self-Assessment''': Use predetermined criteria to evaluate severity and mobility
== System Architecture ==
# '''Location Broadcasting''': Send GPS coordinates to emergency contacts via multiple methods
# '''Emergency Services''': Call 911 with precise location, nature of emergency, and equipment details
# '''Remote Assistance''': Activate emergency contact cascade, including family and professional contacts
# '''Equipment Security''': Secure sensitive materials and equipment if possible before evacuation
# '''Work Handoff''': If conscious, brief emergency contacts on current story status and deadlines


=== Equipment Theft/Loss ===
=== Information Separation ===
'''If primary work equipment is stolen or lost:'''
Runbooks contain only procedural guidance. Sensitive information (account numbers, contact details, medical information) is stored separately in encrypted password managers and secure document storage.


# '''Immediate Security''': Remote wipe devices, change all passwords, notify banks of potential card theft
=== Access Methods ===
# '''Documentation''': File police report with serial numbers and detailed equipment list
* '''Digital copies''': Encrypted local storage and cloud backup
# '''Insurance Claims''': Contact equipment insurance, provide required documentation and receipts
* '''Physical copies''': Laminated field guides stored in equipment kits
# '''Minimum Viable Kit''': Activate backup equipment cache or emergency replacement procedure
* '''Memory aids''': Key decision trees memorized for situations where written procedures aren't accessible
# '''Work Continuity''': Assess what work can continue with available equipment, notify clients of delays
# '''Data Recovery''': Restore data from cloud backups, contact IT support for system rebuilds


== Information Storage System ==
== Implementation Guidelines ==


Critical information is stored securely and separately from procedures:
=== Preparation Phase ===
# Study runbook procedures in non-emergency conditions
# Practice key decision trees and communication protocols
# Verify all emergency contact information and backup systems
# Test equipment and communication methods specified in procedures


=== Insurance Documentation ===
=== Activation Phase ===
* Motorcycle/vehicle policy numbers and emergency claim lines
# Quickly assess situation to identify applicable runbook
* Equipment insurance coverage and claim procedures
# Follow step-by-step procedures without deviation during crisis
* Health insurance cards and emergency medical information
# Document actions taken for post-incident analysis
* Rental insurance for temporary accommodations
# Communicate status updates per runbook communication protocols


=== Medical Information ===
=== Recovery Phase ===
* Blood type, allergies, and current medications
# Complete all follow-up actions specified in applicable runbook
* Emergency medical contacts and preferred hospitals
# Document lessons learned and system performance during incident
* Medical power of attorney and advance directives
# Update procedures based on real-world effectiveness
* Vaccination records and medical history summaries
# Brief trusted contacts on incident resolution and system improvements
 
=== Identity and Legal ===
* Driver's license, passport, and backup ID information
* Legal contacts and emergency representation
* Press credentials and professional identification
* Important document storage locations
 
=== Financial Access ===
* Banking information and emergency access procedures
* Credit card companies and fraud reporting lines
* Emergency fund access and transfer procedures
* Payment processing and client billing continuity
 
=== Equipment Registry ===
* Serial numbers, purchase dates, and warranty information
* Replacement cost estimates and preferred vendors
* Configuration backups and license keys
* Insurance claim values and depreciation schedules


== System Maintenance ==
== System Maintenance ==


=== Monthly Checks ===
=== Regular Testing ===
* Verify emergency contact information remains current
* '''Monthly''': Review contact information and verify system access
* Test backup communication methods and devices
* '''Quarterly''': Full walkthrough of one randomly selected runbook
* Update equipment inventory and serial numbers
* '''Semi-annually''': Test all backup communication and access methods
* Review and update insurance coverage
* '''Annually''': Complete system review and update all procedures
 
=== Quarterly Reviews ===
* Full runbook procedure walkthrough
* Test emergency access to all critical systems
* Update backup equipment and supply caches
* Review lessons learned from any incidents


=== Annual Updates ===
=== Documentation Updates ===
* Complete system review with trusted contacts
* Update procedures after any real-world activation
* Update all insurance policies and coverage limits
* Incorporate lessons learned from training exercises
* Refresh physical document copies and storage locations
* Revise based on changes to insurance, equipment, or operating procedures
* Conduct full emergency response exercise
* Version control all changes with dates and rationale


== Field Implementation ==
== Usage Philosophy ==


These procedures are designed to be:
These runbooks assume:
* '''Executable under stress''' - Simple steps that don't require complex decision-making
* '''Limited cognitive capacity''' during crisis - procedures must be simple and clear
* '''Equipment-independent''' - Can be followed with whatever communication tools are available
* '''Degraded communication''' - multiple backup methods and clear priorities
* '''Scalable''' - Procedures work for minor incidents and major emergencies
* '''Equipment failure''' - procedures work with minimal tools and technology
* '''Tested''' - Regular practice ensures procedures work when needed
* '''Time pressure''' - critical actions prioritized in first 15 minutes of each scenario


The runbooks assume you may be operating with limited connectivity, damaged equipment, or while injured, and provide multiple pathways for each critical function.
The goal is not perfection but rapid, effective response that protects life, maintains operational security, and preserves professional obligations even under adverse conditions.


== Categories ==
== Categories ==

Latest revision as of 22:08, 31 August 2025

Runbooks are field-tested emergency procedures designed for independent journalists, field workers, and anyone operating alone in remote locations. Each runbook provides step-by-step protocols that can be executed under stress.

Core Emergency Runbooks

Vehicle Failure Runbook

Complete procedures for handling transportation breakdowns during field operations, including safety assessment, damage evaluation, insurance procedures, alternative transportation, and work continuity planning.

Digital Security Incident Runbook

Comprehensive response protocols for account compromises, device theft, and system access loss, covering immediate isolation, account recovery, source protection, and system restoration.

Solo Medical Emergency Runbook

Emergency medical procedures for serious illness or injury when working alone, including self-assessment, emergency response, evacuation procedures, and work continuity measures.

Equipment Theft/Loss Runbook

(Planned - procedures for securing systems after equipment theft, insurance claims, replacement workflows, and maintaining operational security)

Legal/Detention Runbook

(Planned - protocols for arrest situations, legal representation, communication restrictions, and professional obligations during detention)

System Architecture

Information Separation

Runbooks contain only procedural guidance. Sensitive information (account numbers, contact details, medical information) is stored separately in encrypted password managers and secure document storage.

Access Methods

  • Digital copies: Encrypted local storage and cloud backup
  • Physical copies: Laminated field guides stored in equipment kits
  • Memory aids: Key decision trees memorized for situations where written procedures aren't accessible

Implementation Guidelines

Preparation Phase

  1. Study runbook procedures in non-emergency conditions
  2. Practice key decision trees and communication protocols
  3. Verify all emergency contact information and backup systems
  4. Test equipment and communication methods specified in procedures

Activation Phase

  1. Quickly assess situation to identify applicable runbook
  2. Follow step-by-step procedures without deviation during crisis
  3. Document actions taken for post-incident analysis
  4. Communicate status updates per runbook communication protocols

Recovery Phase

  1. Complete all follow-up actions specified in applicable runbook
  2. Document lessons learned and system performance during incident
  3. Update procedures based on real-world effectiveness
  4. Brief trusted contacts on incident resolution and system improvements

System Maintenance

Regular Testing

  • Monthly: Review contact information and verify system access
  • Quarterly: Full walkthrough of one randomly selected runbook
  • Semi-annually: Test all backup communication and access methods
  • Annually: Complete system review and update all procedures

Documentation Updates

  • Update procedures after any real-world activation
  • Incorporate lessons learned from training exercises
  • Revise based on changes to insurance, equipment, or operating procedures
  • Version control all changes with dates and rationale

Usage Philosophy

These runbooks assume:

  • Limited cognitive capacity during crisis - procedures must be simple and clear
  • Degraded communication - multiple backup methods and clear priorities
  • Equipment failure - procedures work with minimal tools and technology
  • Time pressure - critical actions prioritized in first 15 minutes of each scenario

The goal is not perfection but rapid, effective response that protects life, maintains operational security, and preserves professional obligations even under adverse conditions.

Categories