Keywords: Data Security (6)

save
save to

Please log in to save materials.

selected filters:
Data Management Ethics Resources

Data Management Ethics Resources

These resources were taken from the Research Ethics Program Website, University of ... (more)

These resources were taken from the Research Ethics Program Website, University of California at San Diego (http://ethics.ucsd.edu/resources/resources-data.html). All web links have been verified and updated by the HIBBs project, as of 8/2011. (less)

Subject:
Science and Technology
Material Type:
Readings
Collection:
OER Africa
Provider:
Research Ethics Program Website
Remix and Share
Ethics and Integrity in Data Use and Management Self-Assessment Questions

Ethics and Integrity in Data Use and Management Self-Assessment Questions

This module defines basic concepts related to the ethics of data use, ... (more)

This module defines basic concepts related to the ethics of data use, compares the ethics of using clinical and research data, and reviews key ethical guidelines and regulations. The module explains why U.S. regulations are relevant for data managers outside the U.S. The module outlines how key ethics concepts affect data retention, sharing, security, ownership, and analysis as well as publication of research results. (less)

Subject:
Science and Technology
Material Type:
Textbooks
Collection:
OER Africa
Provider:
Global Health Informatics Partnership (GHIP)
Author:
John E. Sidle
Remix and Share
Seminar on Information Policy

Seminar on Information Policy

This seminar provides students an opportunity to do in-depth research into an ... (more)

This seminar provides students an opportunity to do in-depth research into an information policy topic of their interest. Students will gain an understanding of current United States Government Policy in areas involved with information and information technology. Policies are forming and changing daily. In order to keep up with these changes the class includes guest lecturers who are studying or actually creating policies in the information area. The first part of the course consists of the student selecting and defining a topic. The second part of the course involves the presentation and discussion of the topic. As an advanced graduate course there is an expectation that the final paper will be, with suitable editing, publishable in a journal. (less)

Subject:
Science and Technology
Material Type:
Full Course
Collection:
Open.Michigan
Provider:
University of Michigan
Author:
Victor Rosenberg
No Strings Attached
Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues

Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues

As data collection and information networks expand (and stories of security breaches ... (more)

As data collection and information networks expand (and stories of security breaches and the misuse of personal information abound), data security and privacy issues are increasingly central parts of the information policy landscape. Legislators, regulators, businesses, and other institutions of all kinds are under increasing pressure to draft and implement effective laws, regulations, and security and privacy programs under rapidly changing technological, business, and legal conditions. A strong need is arising for individuals with the training and skills to work in this unsettled and evolving environment. This course examines security issues related to the safeguarding of sensitive personal and corporate information against inadvertent disclosure; policy and societal questions concerning the value of security and privacy regulations, the real-world effects of data breaches on individuals and businesses, and the balancing of interests among individuals, government, and enterprises; current and proposed laws and regulations that govern data security and privacy; private-sector regulatory efforts and self-help measures; emerging technologies that may affect security and privacy concerns; and issues related to the development of enterprise data security programs, policies, and procedures that take into account the requirements of all relevant constituencies, e.g., technical, business, and legal. (less)

Subject:
Science and Technology
Material Type:
Full Course
Collection:
Open.Michigan
Provider:
University of Michigan
Author:
Don Blumenthal
Remix and Share
World Medical Association Declaration of Helsinki

World Medical Association Declaration of Helsinki

The World Medical Association (WMA) has developed the Declaration of Helsinki as ... (more)

The World Medical Association (WMA) has developed the Declaration of Helsinki as a statement of ethical principles for medical research involving human subjects, including research on identifiable human material and data. The Declaration is intended to be read as a whole and each of its constituent paragraphs should not be applied without consideration of all other relevant paragraphs. (less)

Subject:
Science and Technology
Social Sciences
Material Type:
Readings
Collection:
OER Africa
Provider:
World Medical Association
Read the Fine Print
2002 llaF ,gnivloS melborP gnireenignE dna sretupmoC ot noitcudortnI

2002 llaF ,gnivloS melborP gnireenignE dna sretupmoC ot noitcudortnI

.desu si egaugnal gnimmargorp avaJ ehT .gninnalp dna ,tnemeganam ,ecneics ,gnireenigne ni ... (more)

.desu si egaugnal gnimmargorp avaJ ehT .gninnalp dna ,tnemeganam ,ecneics ,gnireenigne ni smelborp gnivlos rof seuqinhcet gnipoleved no si sisahpmE .scipot decnavda detceles dna scihparg retupmoc ,gnihcraes dna gnitros ,serutcurts atad ,sdohtem laciremun ,secafretni resu lacihparg ,stpecnoc gnimmargorp revoc smelborp gnimmargorp ylkeeW .esruoc eht fo sucof eht si tnempoleved dna ngised erawtfos detneiro-tcejbO .snoitacilppa cifitneics dna gnireenigne rof sdohtem lanoitatupmoc dna tnempoleved erawtfos latnemadnuf stneserp esruoc sihT (less)

Subject:
Science and Technology
Material Type:
Assessments
Full Course
Homework and Assignments
Lecture Notes
Syllabi
Collection:
MIT OpenCourseWare
Provider:
M.I.T.
Author:
George Kocur
Remix and Share