On April 9, 1917 Erie County Medical Center, a 550-bed facility in Buffalo, N.Y.
ID: 385068 • Letter: O
Question
On April 9, 1917 Erie County Medical Center, a 550-bed facility in Buffalo, N.Y. had a virus attack on their computer system that took well over a week to restore. The system was completely shut down and staff had to use manual, paper-based processes to complete documentation of patient related activities. Imagine that you are the manager of a moderately sized hospital and clinic and have been tasked with developing a team to create a policy on good computer habits. Who would you include on your team, and why? List at least five things that you would implement and how you would go about educating your employees on cybersecurity. In addition, ask one question about this topic for others to answer and/or clarify.Your initial response should be posted by mid-week with follow up by responding to at least two other students by the LP due date. On April 9, 1917 Erie County Medical Center, a 550-bed facility in Buffalo, N.Y. had a virus attack on their computer system that took well over a week to restore. The system was completely shut down and staff had to use manual, paper-based processes to complete documentation of patient related activities. Imagine that you are the manager of a moderately sized hospital and clinic and have been tasked with developing a team to create a policy on good computer habits. Who would you include on your team, and why? List at least five things that you would implement and how you would go about educating your employees on cybersecurity. In addition, ask one question about this topic for others to answer and/or clarify.
Your initial response should be posted by mid-week with follow up by responding to at least two other students by the LP due date. On April 9, 1917 Erie County Medical Center, a 550-bed facility in Buffalo, N.Y. had a virus attack on their computer system that took well over a week to restore. The system was completely shut down and staff had to use manual, paper-based processes to complete documentation of patient related activities. Imagine that you are the manager of a moderately sized hospital and clinic and have been tasked with developing a team to create a policy on good computer habits. Who would you include on your team, and why? List at least five things that you would implement and how you would go about educating your employees on cybersecurity. In addition, ask one question about this topic for others to answer and/or clarify.
Your initial response should be posted by mid-week with follow up by responding to at least two other students by the LP due date.
Explanation / Answer
Answer
Question: Who would you include in your team and why?
Answer: The team needs to be cross functional team which means minimum one representation from each and every department of the hospital or clinic where computers are in use.
The team under development is going to be the team who will creates or helps in creating the policy on good computer habits. So input from each and every department is needed so that the policy can be made using all diverse inputs and the rules which will be applicable for each and every department of the hospital/clinic.
Departments in hospital are like admission department, billing department, lab department, medicine department, O.T. department, Mediclaim department, food department, counseling department, housekeeping department, nursing departments, facility department, maintenance department etc.
The representative from each department is needed because the inputs are needed from each department, so that their voice/ requirements of each department are captured and feed back in the policy, so that the policy captures requirements of all departments. When the policy is formed, then the department representative can explain/teach/educate their department team members on the upcoming policy on good habit of computer usage.
Five things that we would implements: We would like to implement five things on cyber security are as below –
Educating employees on cyber security: - We would like to develop the below plan for training/educating on cyber security as below:
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.