Effective Facebook Use for Indivisible Groups

This informative guide to the ins and outs of Facebook was put together by an Indivisible working group last year: How to Use Facebook Effectively.

94% of Indivisible groups were using Facebook as of April 2017 and that makes sense—68% of Americans adults are on Facebook and 58% use it daily. Facebook is an effective way for activist groups to do outreach and share events (see: The Women’s March), but major problems develop for groups that try to use it as their only communications tool—and those challenges grow as groups grow.

This document gives you the information and guidance you need to make Facebook work for your group, including what functions are better handled on other platforms.

Good organization and communication are so critical to our efforts. If you’re an admin or an active user of an Indivisible Facebook group or page – or if you’re not even sure what the difference is between a “group” and a “page” – then take some time to read this short guide.

And pass it on!

Introducing IT: Indivisible Technology

Introducing a new effort: Indivisible Technology Austin, the IT group that can help you #resist.

If you hate the Trumpist agenda but love technology, we’d love to have your help. We’ll have regular working meetings for whoever can join – the first will be on Thursday, Oct. 5. We also plan to have a Challenge Team in the upcoming ATX Political Hackathon. There’s lots to do, and the more help we have, the more we can achieve. Sign up today!

We’ll be posting the occasional technology-related items here on the blog, and the first one, on the critical topic of information security, is below. You may have seen similar posts in this space before, and you’ll probably see more in the future – this stuff is important!

This is from a resource page provided by the national-level Indivisible site:


  1. Identify a trusted security expert or advisor for your group if possible.
  2. Take an inventory of your main communications systems and assess what your top information security priorities and risks might be.
  3. Keep all your systems up to date; install legitimate security patches.
  4. Review the privacy settings on your social media accounts.
  5. Use strong passwords on all your important accounts.
  6. Enable 2-Factor Authentication whenever possible.
  7. No security system is perfect; assume anything you write or send online may become public.

Read all the details here about each of these points, share this information widely, and take steps today to keep your online activity safe. If you have questions or need help, let us know.