
Once up on a time, I was asked to be de facto medical director for a newly-formed county mental health services program. It was quite well put together, and ultimately would be remarkably successful. When I arrived, however, I was met by a representative of the IT firm the program had hired to configure their networking and provide computers for the program’s thirty or so employees. I was carrying my laptop in a bag and had an iPhone in my hand, and this person greeted me by announcing that “under no circumstances will I allow those devices on my network.”
Sigh.
I don’t think the guy knew I was to be medical director and, even if he did, he was probably used to intimidating medical staff. What he had no way of knowing was that I had twenty years or so experience as a cybersecurity consultant and had also written the electronic medical record and practice management software that the program was going to be using. I suppose he shouldn’t have been faulted for not knowing my position and background, but he absolutely should not have approached any of my staff the arrogant way that he did.
“Whose network?” I asked. He stepped back. I proceeded to explain to him that there was one purpose, and one purpose only, for the network that his company was being paid to implement, and that was to further patient care. If he was so sure that “his” network couldn’t accommodate my devices, then he should pack up “his” network and go home. I went on into what was to become my office, and I saw a couple of staff members pull him aside, presumably to explain that he had just rudely given orders to the most powerful single person in the room.
We got along much better after that. They ended up supporting several servers for us, and I think they learned a lot. They taught me some stuff, too. But IT people who assume they’re the center of the universe and forget that they are providing tools toward a larger purpose really need to get a grip.
—2p