Browse Definitions :
Definition

communication plan

A communication plan is a policy-driven approach to providing stakeholders with information. The plan formally defines who should be given specific information, when that information should be delivered and what communication channels will be used to deliver the information.

An effective communications management plan anticipates what information will need to be communicated to specific audience segments. The plan should also address who has the authority to communicate confidential or sensitive information and how information should be disseminated (email, websites, printed reports, and/or presentations). Finally, the plan should define what communication channels stakeholders will use to solicit feedback and how communication will be documented and archived.

Communication plans play an important role in change management. An effective communication strategy can help break down resistance to change by getting everyone on the same page and helping stakeholders become engaged and endorse the need for change and the steps being taken to bring it about.

In project management, the communications plan may include a glossary of common terms to ensure all stakeholders use terms consistently. This glossary may also define and include samples of templates, reports and forms that the project manager will use to communicate information.

A communication plan for emergency situations is similar, but must also address ways both electronic and non-electronic communication channels should be used to disseminate information. This includes announcements over a building paging system, automated text messages, email alerts, pre-recorded robocalls and the use of phone trees and social media.

This was last updated in May 2015

Continue Reading About communication plan

SearchCompliance

SearchSecurity

  • whaling attack (whaling phishing)

    A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets...

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close