In this Discussion you will critique the actions of an administrator interacting with a peer leader, the organizational CIO, in a stressful situation involving data compromise. You are asked to think through various risk management strategies that might have been deployed to avoid this type of a situation in the future. Emphasis is placed on leadership behaviors and recommendations on how this leader might have acted differently to achieve the most constructive outcome in a volatile situation.
Video Prompt and Response: CIO with administrator exploring first access. Breach of security protocol.
To prepare:
- Review the Protecting Patient Data I media piece in your Learning Resources
- Reflect on the principles of security, privacy, and ethics as they apply to HIT systems and this scenario.
- Consider risk management strategies for the management of strategic information assets using best IT industry practices.
Post:
- Prepare a comment in response to the Protecting Patient Data Imedia piece. Critique the actions of the administrator in her conversation with the CIO. From a security, privacy, and ethics standpoint how might the administrator have handled the conversation differently? What risk management strategies could have been used?