A third model would involve using an electronic log such as found in the “REDI3foremergencies ” software program.  It feeds information into  a secure scrolling log that identifies the exact time and from where the information came, by ICS position and provides a method of communicating with that person if verification is necessary.