Linked: How to Be a Mental Health Ally
|

Linked: How to Be a Mental Health Ally

It’s that first line that should grab your attention because so many people do not see mental health struggles as something that impacts them, or will impact them. But the numbers don’t lie. Someone you know, probably even someone very close to you, is dealing with mental health struggles as you read this. Someone you work with is doing the same themselves or supporting someone else who is.

How great would it be if we all recognized that and provided a safe place for them to talk about those struggles instead of not welcoming their voices and causing more harm?

I don’t think we can even imagine how helpful that would be because we see it so infrequently. It’s time for that to change.

Linked: How to Survive Constant Change at Work
|

Linked: How to Survive Constant Change at Work

The interesting thing to think about is not just in regards to your own managers. This extends out to clients, partners, customers, etc. When they are allowed to constantly shift the goalposts and your response to your employees on the front lines of those relationships is “eh, you know how they are”, consider the fact that you are not keeping them safe. It’s not just an irritation, it’s creating an environment that is not psychologically safe for them. It is doing harm.

This gets old, and as the quote above says, it contributes to a loss of trust and cynicism. It might also lead to a ton of burnout too.

Linked: Data From Fake Legal Requests Used to Sexually Extort Minors
|

Linked: Data From Fake Legal Requests Used to Sexually Extort Minors

In this case, we have an emergency process. There are good reasons to have that process, if someone is threatening violence to themselves on social media, it’s useful for the tech company to share some information with law enforcement so they can be reached. But, having the ability to get that kind of response from tech companies is also an invitation to hackers. If they can create a fake emergency request they can collect personal information about any user. They can then use that information to target that individual.

When you create that kind of system, the request needs to be coming from a safe, verified, source. When the source is compromised, and the receiver doesn’t have an excellent validation process, bad things are going to happen.

Because when you have that kind of data, people will try and do bad things with it.

Linked: It’s Time For Employers To Support Youth Mental Health
|

Linked: It’s Time For Employers To Support Youth Mental Health

This is sometimes a missing piece regarding mental health and work. It’s not just the people who work for you, it’s the people who work for you with kids or other family members dealing with mental health issues. “Why do employers need to take a leadership role in addressing this crisis? For starters, young people…

Linked: Data breaches happen constantly and there are very little consequences
|

Linked: Data breaches happen constantly and there are very little consequences

This is the crux of the problem. Personal information is going to be breached, eventually. There is no 100% secure data. None. No business, government entity, non-profit, or any other place that collects and stores data is completely secure. The only true security for personal information is to not have it. To have not collected it or delete it once it’s no longer needed.

That is the radical re-think that is necessary. It’s also the complete opposite of everything these organizations have been taught and incentivized to do. If we are going to pass federal privacy laws, this should be the central theme.