In this Discussion you will critique the actions of an administrator interacting with a peer leader, the organizational CIO, in a stressful situation involving data compromise. You are asked to think through various risk management strategies that might have been deployed to avoid this type of a situation in the future. Emphasis is placed on leadership behaviors and recommendations on how this leader might have acted differently to achieve the most constructive outcome in a volatile situation.
Video Prompt and Response: CIO with administrator exploring first access. Breach of security protocol.
To prepare:
- Review the Protecting Patient Data I media piece in your Learning Resources
- Reflect on the principles of security, privacy, and ethics as they apply to HIT systems and this scenario.
- Consider risk management strategies for the management of strategic information assets using best IT industry practices.
Post:
- Prepare a comment in response to the Protecting Patient Data Imedia piece. Critique the actions of the administrator in her conversation with the CIO. From a security, privacy, and ethics standpoint how might the administrator have handled the conversation differently? What risk management strategies could have been used?
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.