Data Center, Midnight
A critical outage threatens a high-profile launch. A senior engineer proposes a hidden logging change to restore service, but it temporarily captures sensitive user fields beyond policy. Approvals are asleep, headlines feel imminent, and customers are furious. Do you authorize the patch, accept partial downtime, or awaken executives for clearance? Map legal exposure, user trust, and reversibility. Note your rollback plan, disclosure approach, and the morning-after report you would sign proudly.