Search Results (7)

Save

Please log in to save materials.

View
Selected filters:
  • Data Security
Data Management Ethics Resources
Conditions of Use:
Remix and Share
Rating

These resources were taken from the Research Ethics Program Website, University of ... More

These resources were taken from the Research Ethics Program Website, University of California at San Diego (http://ethics.ucsd.edu/resources/resources-data.html). All web links have been verified and updated by the HIBBs project, as of 8/2011. Less

More
Material Type:
Readings
Provider:
Research Ethics Program Website
Provider Set:
OER Africa
Less
Ethics and Integrity in Data Use and Management Self-Assessment Questions
Conditions of Use:
Remix and Share
Rating

This module defines basic concepts related to the ethics of data use, ... More

This module defines basic concepts related to the ethics of data use, compares the ethics of using clinical and research data, and reviews key ethical guidelines and regulations. The module explains why U.S. regulations are relevant for data managers outside the U.S. The module outlines how key ethics concepts affect data retention, sharing, security, ownership, and analysis as well as publication of research results. Less

More
Material Type:
Textbooks
Provider:
Global Health Informatics Partnership (GHIP)
Provider Set:
OER Africa
Author:
John E. Sidle
Less
Information Security (06:04): Protecting Your Data
Rating

This video focuses on date protection. We look at how to migrate ... More

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive. Data is always priceless Three topics: -Data migration -Data backup -Data disposal Less

More
Subject:
Information Science
Material Type:
Video Lectures
Less
Seminar on Information Policy
Conditions of Use:
No Strings Attached
Rating

This seminar provides students an opportunity to do in-depth research into an ... More

This seminar provides students an opportunity to do in-depth research into an information policy topic of their interest. Students will gain an understanding of current United States Government Policy in areas involved with information and information technology. Policies are forming and changing daily. In order to keep up with these changes the class includes guest lecturers who are studying or actually creating policies in the information area. The first part of the course consists of the student selecting and defining a topic. The second part of the course involves the presentation and discussion of the topic. As an advanced graduate course there is an expectation that the final paper will be, with suitable editing, publishable in a journal. Less

More
Subject:
Information Science
Material Type:
Full Course
Provider:
University of Michigan
Provider Set:
Open.Michigan
Author:
Victor Rosenberg
Less
Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues
Conditions of Use:
Remix and Share
Rating

As data collection and information networks expand (and stories of security breaches ... More

As data collection and information networks expand (and stories of security breaches and the misuse of personal information abound), data security and privacy issues are increasingly central parts of the information policy landscape. Legislators, regulators, businesses, and other institutions of all kinds are under increasing pressure to draft and implement effective laws, regulations, and security and privacy programs under rapidly changing technological, business, and legal conditions. A strong need is arising for individuals with the training and skills to work in this unsettled and evolving environment. This course examines security issues related to the safeguarding of sensitive personal and corporate information against inadvertent disclosure; policy and societal questions concerning the value of security and privacy regulations, the real-world effects of data breaches on individuals and businesses, and the balancing of interests among individuals, government, and enterprises; current and proposed laws and regulations that govern data security and privacy; private-sector regulatory efforts and self-help measures; emerging technologies that may affect security and privacy concerns; and issues related to the development of enterprise data security programs, policies, and procedures that take into account the requirements of all relevant constituencies, e.g., technical, business, and legal. Less

More
Material Type:
Full Course
Provider:
University of Michigan
Provider Set:
Open.Michigan
Author:
Don Blumenthal
Less
World Medical Association Declaration of Helsinki
Conditions of Use:
Read the Fine Print
Rating

The World Medical Association (WMA) has developed the Declaration of Helsinki as ... More

The World Medical Association (WMA) has developed the Declaration of Helsinki as a statement of ethical principles for medical research involving human subjects, including research on identifiable human material and data. The Declaration is intended to be read as a whole and each of its constituent paragraphs should not be applied without consideration of all other relevant paragraphs. Less

More
Material Type:
Readings
Provider:
World Medical Association
Provider Set:
OER Africa
Less
2002 gnirpS ,ngiseD gnireenignE liviC ot noitcudortnI
Rating

.)310.1( tcejbus ngised enotspac eht dna )150.1 ,140.1 ,130.1( stcejbus ngised aera ... More

.)310.1( tcejbus ngised enotspac eht dna )150.1 ,140.1 ,130.1( stcejbus ngised aera ytlaiceps tneuqesbus eht ni desu si hcihw decudortni si esac ngised egral A .naps efil detcepxe dna ,srotcaf laicos dna cimonoce ,tnemnorivne larutan ,tnemnorivne tliub gnitsixe eht fo noitaredisnoc sa llew sa sehcaorppa lacinhcet snrecnoc ylticilpxe ngised tcejorP .)sdaor dna segdirb ,sgnidliub ,.g.e( seitilicaf tliub no sisahpme na htiw ,sesac ngised lareves sedulcnI .gnireenigne livic ni secitcarp dna seussi ngised sa llew sa ,gnivlos-melborp evitaerc dna ngised gnireenigne fo seuqinhcet dna ,sloot ,yroeht eht ot stneduts secudortnI Less

More
Less