The document provides an overview of Malaysia's Personal Data Protection Act 2010. It discusses key aspects of the Act including the establishment of a Personal Data Protection Commissioner, the 7 data protection principles, and requirements around notice, consent, disclosure, security, retention, data integrity and access. It also discusses some examples of data breaches and penalties for non-compliance. The Act aims to regulate the processing of personal data and protect privacy as digital data and internet usage continues to grow significantly.
Personal Data Protection Act - Employee Data PrivacylegalPadmin
Speech by Pn Adlin Abdul Majid, Advocate & Solicitor from Lee Hishamuddin, given in Labour Law Seminar held by Legal Plus Sdn. Bhd (www.legalplus.com.my) on Apr 9, 2015
The Personal Data Protection Act 2010 has come into force in Malaysia. These slides explain the governing principles in order for you to have an overview whether your company is ready to comply.
Applying the Personal Data Protection Act (Singapore)Benjamin Ang
Presented at a workshop for the Internet Society Singapore Chapter in May 2013. Visit techmusicartandlaw.blogspot.com to contact the author, or www.isoc.sg to find out more about the Internet Society in Singapore
MWLUG - 2017
Tim Clark & Stephanie Heit
Tim & Steph explain the basics of GDPR and give some recommendations about what you can do to be ready.
Data sources are in the final slides.
For more information about how BCC can help you get your Domino data ready for GDPR please contact us here.
http://bcchub.com/bcc-domino-protect/
Personal Data Protection Act - Employee Data PrivacylegalPadmin
Speech by Pn Adlin Abdul Majid, Advocate & Solicitor from Lee Hishamuddin, given in Labour Law Seminar held by Legal Plus Sdn. Bhd (www.legalplus.com.my) on Apr 9, 2015
The Personal Data Protection Act 2010 has come into force in Malaysia. These slides explain the governing principles in order for you to have an overview whether your company is ready to comply.
Applying the Personal Data Protection Act (Singapore)Benjamin Ang
Presented at a workshop for the Internet Society Singapore Chapter in May 2013. Visit techmusicartandlaw.blogspot.com to contact the author, or www.isoc.sg to find out more about the Internet Society in Singapore
MWLUG - 2017
Tim Clark & Stephanie Heit
Tim & Steph explain the basics of GDPR and give some recommendations about what you can do to be ready.
Data sources are in the final slides.
For more information about how BCC can help you get your Domino data ready for GDPR please contact us here.
http://bcchub.com/bcc-domino-protect/
Norfolk Chamber delivered a morning conference based around the European General Data Protection Regulation (GDPR), which will come into force on May 25 2018. Delegates heared from a variety of GDPR expert speakers from legal, marketing, IT and Data Protection perspectives.
GDPR is coming for you whether you’re ready or not. Companies must show compliance by May 25, 2018. Take a look at the presentation to learn more about the new law that is going to change the way data is handled across the world. Read about the how it affects you and the steps you can take to make sure you’re GDPR ready!
About Extentia Information Technology:
Extentia is a global technology and services firm that helps clients transform and realize their digital strategies. With a focus on enterprise mobility, cloud computing, and user experiences, Extentia strives to accomplish and surpass your business goals. Our team is differentiated by an emphasis on excellent design skills that we bring to every project. Extentia’s work environment and culture inspire team members to be innovative and creative, and to provide clients with an exceptional partnership experience.
www.extentia.com
Complying with Singapore Personal Data Protection Act - A Practical GuideDaniel Li
A practical guide of how to comply with the provisions in Singapore Personal Data Protection Act from people, process, and technology (Microsoft specific) perspective.
How GDPR works : companies will be expected to be
fully compliant from 25 May 2018. The regulation
is intended to establish one single set of data
protection rules across Europe
An Overview of the new GDPR regulations including:
• Data Protection Frame Work
• GDPR – Responsibilities
• GDPR – Changes
• GDPR - Exemptions
• GDPR – Rights
• Penalty
• Ten High Level Steps
This is a slightly modified version of a presentation that I gave to fellow lawyers last week. It explains what GDPR is, the policy of data protection and the evolution of data protection legislation from the OECD Guidelines and Council of Europe Convention to the GDPR. It explores the regulation focusing on the data protection principles and, in particular, the lawfulness requirement and the validity of consent. The presentation mentions the Law enforcement data protection directive, the Data Protection Bill and the arrangements post Brexit. Finally, it considers the preparations recommended by the Information Commissioner for small busiesses
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
In 2016, the European Union (EU) approved its General Data Protection Regulation (GDPR) to protect European citizens’ data. As a regulation, the GDPR does not require the implementation of legislation, and will immediately become an applicable law as of the 25th of May, 2018.
What is GDPR exactly trying to accomplish? According to the official documents, the goal is the “protection of natural persons with regard to the processing of personal data and on the free movement of such data.”
In short, organizations that conduct business in the EU will need to be compliant with GDPR, and must come to terms with the huge fines that non-compliance can carry. Fines can be up to €20M or 4% of the annual turnover. For companies that experience breaches that result in the loss of personal data (such as Talk Talk, which lost 170,000 people’s data), the fines will be tremendous.
Join us for discussion about GDPR to learn more about:
The principles that organizations that use personal data need to adhere to
The consequences organizations can face if that do not adhere to this new regulation
How your organization can prepare for the future
Norfolk Chamber delivered a morning conference based around the European General Data Protection Regulation (GDPR), which will come into force on May 25 2018. Delegates heared from a variety of GDPR expert speakers from legal, marketing, IT and Data Protection perspectives.
GDPR is coming for you whether you’re ready or not. Companies must show compliance by May 25, 2018. Take a look at the presentation to learn more about the new law that is going to change the way data is handled across the world. Read about the how it affects you and the steps you can take to make sure you’re GDPR ready!
About Extentia Information Technology:
Extentia is a global technology and services firm that helps clients transform and realize their digital strategies. With a focus on enterprise mobility, cloud computing, and user experiences, Extentia strives to accomplish and surpass your business goals. Our team is differentiated by an emphasis on excellent design skills that we bring to every project. Extentia’s work environment and culture inspire team members to be innovative and creative, and to provide clients with an exceptional partnership experience.
www.extentia.com
Complying with Singapore Personal Data Protection Act - A Practical GuideDaniel Li
A practical guide of how to comply with the provisions in Singapore Personal Data Protection Act from people, process, and technology (Microsoft specific) perspective.
How GDPR works : companies will be expected to be
fully compliant from 25 May 2018. The regulation
is intended to establish one single set of data
protection rules across Europe
An Overview of the new GDPR regulations including:
• Data Protection Frame Work
• GDPR – Responsibilities
• GDPR – Changes
• GDPR - Exemptions
• GDPR – Rights
• Penalty
• Ten High Level Steps
This is a slightly modified version of a presentation that I gave to fellow lawyers last week. It explains what GDPR is, the policy of data protection and the evolution of data protection legislation from the OECD Guidelines and Council of Europe Convention to the GDPR. It explores the regulation focusing on the data protection principles and, in particular, the lawfulness requirement and the validity of consent. The presentation mentions the Law enforcement data protection directive, the Data Protection Bill and the arrangements post Brexit. Finally, it considers the preparations recommended by the Information Commissioner for small busiesses
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
In 2016, the European Union (EU) approved its General Data Protection Regulation (GDPR) to protect European citizens’ data. As a regulation, the GDPR does not require the implementation of legislation, and will immediately become an applicable law as of the 25th of May, 2018.
What is GDPR exactly trying to accomplish? According to the official documents, the goal is the “protection of natural persons with regard to the processing of personal data and on the free movement of such data.”
In short, organizations that conduct business in the EU will need to be compliant with GDPR, and must come to terms with the huge fines that non-compliance can carry. Fines can be up to €20M or 4% of the annual turnover. For companies that experience breaches that result in the loss of personal data (such as Talk Talk, which lost 170,000 people’s data), the fines will be tremendous.
Join us for discussion about GDPR to learn more about:
The principles that organizations that use personal data need to adhere to
The consequences organizations can face if that do not adhere to this new regulation
How your organization can prepare for the future
Understanding your heart health with your heloAlan Teh
To fully use your HELO you need to understand basic heart function, physiology and even some basic ECG knowlege. This presentation should help all HELO users.
This slide will discuss about history of hacking, the purpose and effect of hacking, the steps that can be used to help prevent hacking from occurring. Also being discussed are hacktivism, or political hacking in Malaysia and solution taken and the law implemented in Malaysia.Malaysia and Solution implemented
Data Privacy and Security in Clinical Trials: Safeguarding Patient InformationClinosolIndia
Data privacy and security in clinical trials are critical to safeguard patient information and ensure compliance with relevant regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States and the General Data Protection Regulation (GDPR) in the European Union.
General Data Protection Regulation (GDPR) for Identity ArchitectsWSO2
https://wso2.com/solutions/regulatory-compliance/gdpr/
The EU General Data Protection Regulation (GDPR) has many identity architects uniquely positioned to help their organizations to comply with the ruling.
Effective from 25th May 2018, the regulation 2016/679 of the European parliament and of the council, replaces the Data Protection Directive 95/46/EC and is designed to harmonize data privacy laws across Europe. It aims to protect and empower all EU residents' data privacy and to reshape the way organizations across the region approach data privacy. GDPR is also quite prominent due to the heavy penalties introduced for violators — which could be as much as 4% of the annual global turnover or €20 million (whichever is greater).
In this webinar we will discuss all technical aspects of the regulation and what steps you as an identity architect can take to ensure that your security strategy is primed for GDPR.
Training innovations information governance slideshare 2015Patrick Doyle
What you will learn in this training:
Principles of Information Governance and their application to health and social care organisations
Accessing Information Governance resources including national legislation, guidance and local policies & procedures
Health and social care organisations’ responsibilities
Protection of an individual’s confidentiality and the Caldicott Principles
How to practice and promote a confidential service
Principles of ensuring and maintaining good client records
Recognising / responding to Freedom of Information requests
Keeping Information Secure
Startups operating in the health IT sector have a legal obligation to safeguard health records in their custody and ensure that they are securely retained and transferred.
Complying with the industry privacy laws can be daunting. In many cases, it can pose a barrier to entry for startups.
Whether you are new to the sector or want to deepen your understanding of the laws, we can help. A question-and-answer period will follow the main presentation.
Data Privacy and consent management .. .ClinosolIndia
Data privacy and consent management are critical aspects of ensuring that individuals' personal information is handled responsibly and ethically, particularly in healthcare settings where sensitive medical data is involved. Data privacy refers to the protection of personal information from unauthorized access, use, or disclosure, while consent management involves obtaining and managing individuals' permissions for the collection, storage, and processing of their data.
In healthcare, patients entrust providers with their sensitive medical information, expecting that it will be kept confidential and used only for legitimate purposes related to their care. Robust data privacy measures include encryption, access controls, and anonymization techniques to safeguard patient data from unauthorized access or breaches. Additionally, healthcare organizations must adhere to regulatory standards such as HIPAA in the United States or GDPR in the European Union, which outline specific requirements for the protection of patient information and impose penalties for non-compliance.
Consent management plays a crucial role in ensuring that individuals have control over how their data is used. Patients should be informed about the purposes for which their data will be collected and processed, as well as any potential risks or benefits associated with its use. Obtaining informed consent involves providing individuals with clear and transparent information about their privacy rights and giving them the opportunity to consent to or decline the use of their data for specific purposes. Consent management systems help healthcare organizations track and manage patients' consent preferences, ensuring that data is used in accordance with their wishes and legal requirements.
Effective data privacy and consent management practices not only protect individuals' privacy rights but also foster trust and transparency in healthcare relationships. By implementing robust security measures, respecting patients' autonomy, and promoting informed decision-making, healthcare organizations can uphold the principles of data privacy and consent while leveraging data responsibly to improve patient care and outcomes.
The Malaysian Oncological Society and the European Society for Medical Oncology will be holding a joint conference to share the highlights of the ESMO 2014 Congress with South-East Asian delegates.
The conference will be held in Penang, Malaysia from 23-25 January 2015 and the theme is "Precision Medicine in Cancer Care".
Official website: http://esmomos2015penang.com.my/
For Malaysian doctors: The Medico-Legal Society of Malaysia (MLSM) and the Kuala Lumpur Regional Centre for Arbitration (KLRCA) would like to invite you for a dialogue with Datuk Seri Gopal Sri Ram on the topic "Has the Law Forced Doctors to Practice Defensive Medicine?"
These lecture slides, by Dr Sidra Arshad, offer a quick overview of physiological basis of a normal electrocardiogram.
Learning objectives:
1. Define an electrocardiogram (ECG) and electrocardiography
2. Describe how dipoles generated by the heart produce the waveforms of the ECG
3. Describe the components of a normal electrocardiogram of a typical bipolar leads (limb II)
4. Differentiate between intervals and segments
5. Enlist some common indications for obtaining an ECG
Study Resources:
1. Chapter 11, Guyton and Hall Textbook of Medical Physiology, 14th edition
2. Chapter 9, Human Physiology - From Cells to Systems, Lauralee Sherwood, 9th edition
3. Chapter 29, Ganong’s Review of Medical Physiology, 26th edition
4. Electrocardiogram, StatPearls - https://www.ncbi.nlm.nih.gov/books/NBK549803/
5. ECG in Medical Practice by ABM Abdullah, 4th edition
6. ECG Basics, http://www.nataliescasebook.com/tag/e-c-g-basics
Tom Selleck Health: A Comprehensive Look at the Iconic Actor’s Wellness Journeygreendigital
Tom Selleck, an enduring figure in Hollywood. has captivated audiences for decades with his rugged charm, iconic moustache. and memorable roles in television and film. From his breakout role as Thomas Magnum in Magnum P.I. to his current portrayal of Frank Reagan in Blue Bloods. Selleck's career has spanned over 50 years. But beyond his professional achievements. fans have often been curious about Tom Selleck Health. especially as he has aged in the public eye.
Follow us on: Pinterest
Introduction
Many have been interested in Tom Selleck health. not only because of his enduring presence on screen but also because of the challenges. and lifestyle choices he has faced and made over the years. This article delves into the various aspects of Tom Selleck health. exploring his fitness regimen, diet, mental health. and the challenges he has encountered as he ages. We'll look at how he maintains his well-being. the health issues he has faced, and his approach to ageing .
Early Life and Career
Childhood and Athletic Beginnings
Tom Selleck was born on January 29, 1945, in Detroit, Michigan, and grew up in Sherman Oaks, California. From an early age, he was involved in sports, particularly basketball. which played a significant role in his physical development. His athletic pursuits continued into college. where he attended the University of Southern California (USC) on a basketball scholarship. This early involvement in sports laid a strong foundation for his physical health and disciplined lifestyle.
Transition to Acting
Selleck's transition from an athlete to an actor came with its physical demands. His first significant role in "Magnum P.I." required him to perform various stunts and maintain a fit appearance. This role, which he played from 1980 to 1988. necessitated a rigorous fitness routine to meet the show's demands. setting the stage for his long-term commitment to health and wellness.
Fitness Regimen
Workout Routine
Tom Selleck health and fitness regimen has evolved. adapting to his changing roles and age. During his "Magnum, P.I." days. Selleck's workouts were intense and focused on building and maintaining muscle mass. His routine included weightlifting, cardiovascular exercises. and specific training for the stunts he performed on the show.
Selleck adjusted his fitness routine as he aged to suit his body's needs. Today, his workouts focus on maintaining flexibility, strength, and cardiovascular health. He incorporates low-impact exercises such as swimming, walking, and light weightlifting. This balanced approach helps him stay fit without putting undue strain on his joints and muscles.
Importance of Flexibility and Mobility
In recent years, Selleck has emphasized the importance of flexibility and mobility in his fitness regimen. Understanding the natural decline in muscle mass and joint flexibility with age. he includes stretching and yoga in his routine. These practices help prevent injuries, improve posture, and maintain mobilit
New Directions in Targeted Therapeutic Approaches for Older Adults With Mantl...i3 Health
i3 Health is pleased to make the speaker slides from this activity available for use as a non-accredited self-study or teaching resource.
This slide deck presented by Dr. Kami Maddocks, Professor-Clinical in the Division of Hematology and
Associate Division Director for Ambulatory Operations
The Ohio State University Comprehensive Cancer Center, will provide insight into new directions in targeted therapeutic approaches for older adults with mantle cell lymphoma.
STATEMENT OF NEED
Mantle cell lymphoma (MCL) is a rare, aggressive B-cell non-Hodgkin lymphoma (NHL) accounting for 5% to 7% of all lymphomas. Its prognosis ranges from indolent disease that does not require treatment for years to very aggressive disease, which is associated with poor survival (Silkenstedt et al, 2021). Typically, MCL is diagnosed at advanced stage and in older patients who cannot tolerate intensive therapy (NCCN, 2022). Although recent advances have slightly increased remission rates, recurrence and relapse remain very common, leading to a median overall survival between 3 and 6 years (LLS, 2021). Though there are several effective options, progress is still needed towards establishing an accepted frontline approach for MCL (Castellino et al, 2022). Treatment selection and management of MCL are complicated by the heterogeneity of prognosis, advanced age and comorbidities of patients, and lack of an established standard approach for treatment, making it vital that clinicians be familiar with the latest research and advances in this area. In this activity chaired by Michael Wang, MD, Professor in the Department of Lymphoma & Myeloma at MD Anderson Cancer Center, expert faculty will discuss prognostic factors informing treatment, the promising results of recent trials in new therapeutic approaches, and the implications of treatment resistance in therapeutic selection for MCL.
Target Audience
Hematology/oncology fellows, attending faculty, and other health care professionals involved in the treatment of patients with mantle cell lymphoma (MCL).
Learning Objectives
1.) Identify clinical and biological prognostic factors that can guide treatment decision making for older adults with MCL
2.) Evaluate emerging data on targeted therapeutic approaches for treatment-naive and relapsed/refractory MCL and their applicability to older adults
3.) Assess mechanisms of resistance to targeted therapies for MCL and their implications for treatment selection
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...GL Anaacs
Contact us if you are interested:
Email / Skype : kefaya1771@gmail.com
Threema: PXHY5PDH
New BATCH Ku !!! MUCH IN DEMAND FAST SALE EVERY BATCH HAPPY GOOD EFFECT BIG BATCH !
Contact me on Threema or skype to start big business!!
Hot-sale products:
NEW HOT EUTYLONE WHITE CRYSTAL!!
5cl-adba precursor (semi finished )
5cl-adba raw materials
ADBB precursor (semi finished )
ADBB raw materials
APVP powder
5fadb/4f-adb
Jwh018 / Jwh210
Eutylone crystal
Protonitazene (hydrochloride) CAS: 119276-01-6
Flubrotizolam CAS: 57801-95-3
Metonitazene CAS: 14680-51-4
Payment terms: Western Union,MoneyGram,Bitcoin or USDT.
Deliver Time: Usually 7-15days
Shipping method: FedEx, TNT, DHL,UPS etc.Our deliveries are 100% safe, fast, reliable and discreet.
Samples will be sent for your evaluation!If you are interested in, please contact me, let's talk details.
We specializes in exporting high quality Research chemical, medical intermediate, Pharmaceutical chemicals and so on. Products are exported to USA, Canada, France, Korea, Japan,Russia, Southeast Asia and other countries.
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...VarunMahajani
Disruption of blood supply to lung alveoli due to blockage of one or more pulmonary blood vessels is called as Pulmonary thromboembolism. In this presentation we will discuss its causes, types and its management in depth.
Couples presenting to the infertility clinic- Do they really have infertility...Sujoy Dasgupta
Dr Sujoy Dasgupta presented the study on "Couples presenting to the infertility clinic- Do they really have infertility? – The unexplored stories of non-consummation" in the 13th Congress of the Asia Pacific Initiative on Reproduction (ASPIRE 2024) at Manila on 24 May, 2024.
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stockrebeccabio
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
Telegram: bmksupplier
signal: +85264872720
threema: TUD4A6YC
You can contact me on Telegram or Threema
Communicate promptly and reply
Free of customs clearance, Double Clearance 100% pass delivery to USA, Canada, Spain, Germany, Netherland, Poland, Italy, Sweden, UK, Czech Republic, Australia, Mexico, Russia, Ukraine, Kazakhstan.Door to door service
Hot Selling Organic intermediates
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists Saeid Safari
Preoperative Management of Patients on GLP-1 Receptor Agonists like Ozempic and Semiglutide
ASA GUIDELINE
NYSORA Guideline
2 Case Reports of Gastric Ultrasound
The prostate is an exocrine gland of the male mammalian reproductive system
It is a walnut-sized gland that forms part of the male reproductive system and is located in front of the rectum and just below the urinary bladder
Function is to store and secrete a clear, slightly alkaline fluid that constitutes 10-30% of the volume of the seminal fluid that along with the spermatozoa, constitutes semen
A healthy human prostate measures (4cm-vertical, by 3cm-horizontal, 2cm ant-post ).
It surrounds the urethra just below the urinary bladder. It has anterior, median, posterior and two lateral lobes
It’s work is regulated by androgens which are responsible for male sex characteristics
Generalised disease of the prostate due to hormonal derangement which leads to non malignant enlargement of the gland (increase in the number of epithelial cells and stromal tissue)to cause compression of the urethra leading to symptoms (LUTS
- Video recording of this lecture in English language: https://youtu.be/lK81BzxMqdo
- Video recording of this lecture in Arabic language: https://youtu.be/Ve4P0COk9OI
- Link to download the book free: https://nephrotube.blogspot.com/p/nephrotube-nephrology-books.html
- Link to NephroTube website: www.NephroTube.com
- Link to NephroTube social media accounts: https://nephrotube.blogspot.com/p/join-nephrotube-on-social-media.html
Prix Galien International 2024 Forum ProgramLevi Shapiro
June 20, 2024, Prix Galien International and Jerusalem Ethics Forum in ROME. Detailed agenda including panels:
- ADVANCES IN CARDIOLOGY: A NEW PARADIGM IS COMING
- WOMEN’S HEALTH: FERTILITY PRESERVATION
- WHAT’S NEW IN THE TREATMENT OF INFECTIOUS,
ONCOLOGICAL AND INFLAMMATORY SKIN DISEASES?
- ARTIFICIAL INTELLIGENCE AND ETHICS
- GENE THERAPY
- BEYOND BORDERS: GLOBAL INITIATIVES FOR DEMOCRATIZING LIFE SCIENCE TECHNOLOGIES AND PROMOTING ACCESS TO HEALTHCARE
- ETHICAL CHALLENGES IN LIFE SCIENCES
- Prix Galien International Awards Ceremony
ARTIFICIAL INTELLIGENCE IN HEALTHCARE.pdfAnujkumaranit
Artificial intelligence (AI) refers to the simulation of human intelligence processes by machines, especially computer systems. It encompasses tasks such as learning, reasoning, problem-solving, perception, and language understanding. AI technologies are revolutionizing various fields, from healthcare to finance, by enabling machines to perform tasks that typically require human intelligence.
Lung Cancer: Artificial Intelligence, Synergetics, Complex System Analysis, S...Oleg Kshivets
RESULTS: Overall life span (LS) was 2252.1±1742.5 days and cumulative 5-year survival (5YS) reached 73.2%, 10 years – 64.8%, 20 years – 42.5%. 513 LCP lived more than 5 years (LS=3124.6±1525.6 days), 148 LCP – more than 10 years (LS=5054.4±1504.1 days).199 LCP died because of LC (LS=562.7±374.5 days). 5YS of LCP after bi/lobectomies was significantly superior in comparison with LCP after pneumonectomies (78.1% vs.63.7%, P=0.00001 by log-rank test). AT significantly improved 5YS (66.3% vs. 34.8%) (P=0.00000 by log-rank test) only for LCP with N1-2. Cox modeling displayed that 5YS of LCP significantly depended on: phase transition (PT) early-invasive LC in terms of synergetics, PT N0—N12, cell ratio factors (ratio between cancer cells- CC and blood cells subpopulations), G1-3, histology, glucose, AT, blood cell circuit, prothrombin index, heparin tolerance, recalcification time (P=0.000-0.038). Neural networks, genetic algorithm selection and bootstrap simulation revealed relationships between 5YS and PT early-invasive LC (rank=1), PT N0—N12 (rank=2), thrombocytes/CC (3), erythrocytes/CC (4), eosinophils/CC (5), healthy cells/CC (6), lymphocytes/CC (7), segmented neutrophils/CC (8), stick neutrophils/CC (9), monocytes/CC (10); leucocytes/CC (11). Correct prediction of 5YS was 100% by neural networks computing (area under ROC curve=1.0; error=0.0).
CONCLUSIONS: 5YS of LCP after radical procedures significantly depended on: 1) PT early-invasive cancer; 2) PT N0--N12; 3) cell ratio factors; 4) blood cell circuit; 5) biochemical factors; 6) hemostasis system; 7) AT; 8) LC characteristics; 9) LC cell dynamics; 10) surgery type: lobectomy/pneumonectomy; 11) anthropometric data. Optimal diagnosis and treatment strategies for LC are: 1) screening and early detection of LC; 2) availability of experienced thoracic surgeons because of complexity of radical procedures; 3) aggressive en block surgery and adequate lymph node dissection for completeness; 4) precise prediction; 5) adjuvant chemoimmunoradiotherapy for LCP with unfavorable prognosis.
Title: Sense of Taste
Presenter: Dr. Faiza, Assistant Professor of Physiology
Qualifications:
MBBS (Best Graduate, AIMC Lahore)
FCPS Physiology
ICMT, CHPE, DHPE (STMU)
MPH (GC University, Faisalabad)
MBA (Virtual University of Pakistan)
Learning Objectives:
Describe the structure and function of taste buds.
Describe the relationship between the taste threshold and taste index of common substances.
Explain the chemical basis and signal transduction of taste perception for each type of primary taste sensation.
Recognize different abnormalities of taste perception and their causes.
Key Topics:
Significance of Taste Sensation:
Differentiation between pleasant and harmful food
Influence on behavior
Selection of food based on metabolic needs
Receptors of Taste:
Taste buds on the tongue
Influence of sense of smell, texture of food, and pain stimulation (e.g., by pepper)
Primary and Secondary Taste Sensations:
Primary taste sensations: Sweet, Sour, Salty, Bitter, Umami
Chemical basis and signal transduction mechanisms for each taste
Taste Threshold and Index:
Taste threshold values for Sweet (sucrose), Salty (NaCl), Sour (HCl), and Bitter (Quinine)
Taste index relationship: Inversely proportional to taste threshold
Taste Blindness:
Inability to taste certain substances, particularly thiourea compounds
Example: Phenylthiocarbamide
Structure and Function of Taste Buds:
Composition: Epithelial cells, Sustentacular/Supporting cells, Taste cells, Basal cells
Features: Taste pores, Taste hairs/microvilli, and Taste nerve fibers
Location of Taste Buds:
Found in papillae of the tongue (Fungiform, Circumvallate, Foliate)
Also present on the palate, tonsillar pillars, epiglottis, and proximal esophagus
Mechanism of Taste Stimulation:
Interaction of taste substances with receptors on microvilli
Signal transduction pathways for Umami, Sweet, Bitter, Sour, and Salty tastes
Taste Sensitivity and Adaptation:
Decrease in sensitivity with age
Rapid adaptation of taste sensation
Role of Saliva in Taste:
Dissolution of tastants to reach receptors
Washing away the stimulus
Taste Preferences and Aversions:
Mechanisms behind taste preference and aversion
Influence of receptors and neural pathways
Impact of Sensory Nerve Damage:
Degeneration of taste buds if the sensory nerve fiber is cut
Abnormalities of Taste Detection:
Conditions: Ageusia, Hypogeusia, Dysgeusia (parageusia)
Causes: Nerve damage, neurological disorders, infections, poor oral hygiene, adverse drug effects, deficiencies, aging, tobacco use, altered neurotransmitter levels
Neurotransmitters and Taste Threshold:
Effects of serotonin (5-HT) and norepinephrine (NE) on taste sensitivity
Supertasters:
25% of the population with heightened sensitivity to taste, especially bitterness
Increased number of fungiform papillae
3. 3
Personal Data Protection Act 2010
• Passed on 10 June 2010
• The Minister has appointed a Director General & created
a PDP Dept
• Once the PDPA comes into force the DG may assume
the role of Data Protection Commissioner
• Once the PDPA is brought into force - Data Users have 3
months to comply
5. 5
Growth of computer networks & internet –
Huge impact on society
• Over the last 3 decades computer networks have made pervasive inroads in
our everyday lives, both in business as well as the home
• The internet came along and connected the world
• Computer networks enabled efficient collection, manipulation and storage of
data – and vast quantities of it too
• Data can be stored anywhere in the world – not necessarily where it is
collected
• Gigabytes of personal data are accessed and used on daily basis
• New threats affecting privacy and data protection (identity theft, facebook,
twitter, friendster, etc)
6. 6
Has your Personal Data been abused lately?
• How many marketing sms’s do you receive in a day?
• Has a bank offered you a pre-approved loan lately?
• Does your telco send you “I love you” mms’s without your consent?
• Did you get a season’s greeting from the Prime Minister lately?
• Did you get an email telling you that you have won USD5 million in a
European lottery?
None of these activities may have had your consent
7. 7
What is Personal data
• Personal Data (PD) means any information which relates directly or
indirectly to a data subject, who is identified or identifiable from that
information
Examples : Name, Address, Photographs, IC, Bank Account details,
Medical Records / History
Some Definitions
Data Subject (DS) – an individual who is the subject of the PD –
includes patients and employees
Data User (DU) – a person who processed any PD or has control
over or authorizes the processing of any PD but does not include a
data processor
8. 8
Processing is defined widely
• Processing – means collecting, recording, holding, storing and
carrying out of operations with that data like organizations,
adaptation, retrieval, use, disclosure, transmission, transfer,
correction, erasure & destruction
Collection
Use
Disclosure
Destruction
9. 9
Application of the PDPA
• The act applies to :
(a) personal data which is processed;
(b) any person who processes and any person who has control over or
authorizes the processing of any personal data in respect of
commercial transactions and such a person is a “data user”;
Commercial transactions –
“... of a commercial nature, whether contractual or not, which includes
any matters relating to the supply or exchange of goods or services,
agency, investments, financing, banking and insurance, but does not
include a credit reporting business carried out by a credit reporting
agency under the Credit Reporting Agencies Act 2010”.
10. 10
Personal Data Flow - patient
HRM
Discharge/Payment
•HIS
Patient
Registration
(demographics )
HRM
PATIENT
Clinical
Information
at Clinic
Procedures
•HIS
•LIS
•OIS
10
HRM
HRM
Clinical
Information
at Wards
HRM
11. 11
The PDPA – Who Does it NOT Apply To?
• The PDPA does not apply to :
The Federal Government
The State Government
PD processed outside Malaysia UNLESS intended to be further
processed in Malaysia
13. 13
Current Regulatory Position – Piecemeal
Approach to Data Protection
Private
Healthcare &
Services Act
MMC Guide on
Confidentiality
Medical Act
MMC Guide on
Medical Records
and Medical
Reports
MMA Code on
Medical Ethics
Patient’s Charter
MMC Code of
Professional
Conduct
14. 14
Pre-PDPA – How Personal Data was dealt with
• PHFSA – hospitals must have a policy on Patients rights:
Information concerning medical treatment and care;
Be provided with patient’s medical report within a reasonable time
• Reg 30 – patient’s MR is the property of Hospital . Patient has a right to
request for medical report
• Retention of MR is for the Limitation Period
• Doctors have right of access to MR of old patients to defend civil actions
15. 15
MMC Guidelines on Doctors
• On medical records and reports
Medical records belong to the hospital
Information in MR belong morally and ethically to the patient
Doctors have obligation to provide comprehensive medical reports upon
request by patient (for 2nd opinion, litigation etc)
• Doctor patient confidentially
No disclosure to 3rd parties without consent of patient
Should not reveal patient PD in medical publications
Drs must exert all powers to preserve patient confidentiality
16. 16
MMC Guidelines for Doctors – Disclosure to 3rd
Parties
• Disclosure within Medical Teams
Drs must obtain consent of Patient to share PD with other doctors
Patient can refuse consent for sharing of PD between doctors
• Disclosure to Employers, Insurers
Dr must inform Patient and obtain consent before disclosure to
these parties
• Disclosure for Medical Teaching and medical audit
Should anonymise PD as far as possible
Doctors who decide to disclose PD must be prepared to explain
and justify their decision (MMC Guideline)
18. The 7 Data Protection Principles Under the
PDPA
General
principle
Notice &
Choice
Principle
Access
Principle
PDPA
Data
Integrity
Principle
Disclosure
Principle
Retention
Principle
Security
Principle
18
19. 19
No
PDP
Principles
What it covers
1
General
Principle
Consent of DS is required to process PD.
For Sensitive Personal Data – explicit consent is required
2
Notice &
Choice
Principle
DU give Notice to DS of the processing, description of PD,
purpose, source of info and right to request access, 3P to
whom DU discloses, how to limit the processing, whether it is
obligatory or voluntary to supply PD
3
Disclosure
Principle
No disclosure of PD without consent of DS
4
Security
Principle
DU must take practical steps to protect PD (IT System &
Internal processes)
5
Retention
Principle
PD should not be kept longer than necessary – must destroy
after purpose is met
6
Data Integrity
Principle
DU must ensure Data processed is accurate, complete and upto-date having regard to the purpose of collection
7
Access
Principle
DS must have access and be able to correct if inaccurate
20. 20
1. General Principle - consent
• A data user cannot process any PD about a Data Subject unless the Data Subject has
given his consent.
• Consent can be expressed or implied
• PD cannot be processed unless :
PD is processed for a lawful purpose directly related to the activity of the Data
User
The processing of PD is necessary for or directly related to that purpose
Directly related to that purpose means the reason that the PD was collected.
Eg: a person comes for a blood test and his consent is acquired to conduct all the
necessary test. However, the consent shall not extend to the publication of his blood
test results in a medical article.
PD is adequate but not excessive in relation to that purpose
Eg: a patients comes to ER to see the doctor for fever medication. It is not necessary to
ask the patient of his grandparents, aunt, uncle’s names, IC, add etc.
Distinction between consent for medical purpose and other purpose
22. 22
2. Notice & Choice Principle
• A DS is required to give written consent to DU:
That PD is being processed and provide a description of the PD being
processed
The purposes for which the PD is collected and processed
DS’s right to request access to and request correction of the PD
Disclosure to any 3rd parties that may be made
23. 23
3. Disclosure principle
• No Personal Data shall be disclosed without the consent of the DS:
For any other purpose other than the original purpose as disclosed to the
DS at the time of collection
A purpose directly related to the purpose above
To any party other than a 3rd party already notified to the DS (under Notice
Principle)
• Disclosure for the purpose of research, discussions in medical meetings /
seminars :This disclosure is allowed as long as the data that is being disclosed cannot be
related to a particular person
• Note: Disclosure to the Ministry of Health – this is a compulsory disclosure
and thus shall be exempted.
24. 24
Case note - disclosure
Improper
disclosure of
SPD to
Government
Agency
The complainant had medical
tests at a pathology clinic and
asked that the results be
provided only to their treating
medical specialist and solicitor.
The tests results were to be part
of a claim that the complainant
was making to a federal
government agency.
The complainant later became
aware that the clinic had
provided the results directly to
that government agency.
DS complained to the Data
Commissioner
The clinic advised the clinic
staff to send directly to the
government agency noted on
the complainant’s form.
The clinic contended that this
was an isolated error.
As this information was
disclosed for a purpose other
than the primary purpose for
which it was collected. The
commissioner formed the view
that the disclosure was an
interference with the
complainant’s privacy.
The clinic paid compensation
to the DS.
26. 26
4. Security Principle
• DU shall take practical steps to protect PD from any
Loss, misuse, modification
Unauthorized or accidental access or disclosure
Alteration or destruction
Having regard to location, IT systems and mode of transfer of PD
• Hospital IT systems such as the HMIS, HIS and LIS need strict policies
• Transfer to 3rd party service providers such as outside lab and transfers of PD overseas
Security issues : use of portable devices (laptops, USB, External hard drive, CD, DVD)
Transmission of patient info via fax
Medical devices storage function
Remote access to MR
Doctors have to comply with Hospital’s policies regarding
PDPA requirements
28. 28
Sony fined GBP 250,000 for Breach of
Security
• A cyber attack on the SONY’s PlayStation Network in April 2011 put a
huge number of consumers at risk of identity theft including credit card
details
• It could have been prevented if Sony’s software was up-to-date and
technical developments hadn’t made passwords unsecure
• “There’s no disguising that this is a business that should have known
better,” said the ICO’s data protection director David Smith
• It is a company that trades on its technical expertise and there is no
doubt in my mind that they had access to both the technical expertise
and the resources to keep this information safe.
29. 29
Data Processor
• Where PD is processed on behalf of DU the DU shall ensure that the
Data Processor :
Provides guarantees in respect of technical and security
measures governing the processing; and
Takes reasonable steps to ensure compliance with those
measures
Eg: The IT system in SDMC PC – system designed for SDH and they do have
access to our patient records.
Data Processor = Outsourced Service Providers
31. 31
Retention Principle
• PD shall not be kept longer than is necessary for the fulfillment of the original
purpose
• DU has duty to take all reasonable steps to ensure that PD is :
• Destroyed (must be done in a proper manner); or
• Permanently deleted
…… if it is no longer required for the purpose for which it was processed
QUESTION : how long is long?
Depends on the nature of your business and the commercial reasons to
keep data
7 years / 25 years / hospital policy
34. 34
Data Integrity Principle
• DU has duty to take all reasonable steps to ensure that PD is :
• Accurate
• Complete
• Not misleading; and
• Kept up to date
35. 35
7. Access Principle
• A data subject shall be given access to his personal data upon Data Access Request
• All information that is being processed by or on behalf of the Data User
• Entitled to an intelligible
copy of the PD
• Access can be just to view or
get a copy
• Subject to some exceptions
Under the PDPA, patient may now get
access to his entire MR
36. 36
Case note
Who can
access PD
Hospital prepared a health
report for an insurance
company
Patient wanted a copy under
access principle
Hospital refused
DC held that all PD held by
the hospital, including
report should be provided
to the data subject
Regardless for whom it was
prepared
38. 38
GE Healthcare Admits Sending NHS Patient
Data to US
• Personal details of 600,000 patients were sent to the US following a
mistake made by the NHS’s IT provider, GE Healthcare
• GE Healthcare admitted that the error had occurred after it had obtained
more patient data than it needed, but stressed that there was no need to
worry
• Overloaded in PD
• GE Healthcare recently discovered that they obtained more patient data
from diagnostic imaging products than they needed to perform services
to their customers
39. 39
NHS Trust fined 325,000 for data breach
• Brighton and Sussex University Hospital NHS Trust has been fined
400,000 euros following a serious breach of the UK Data Protection Act
• Highly sensitive personal data belonging to tens of thousands of patients
and staff, including some relating to HIV and Genito Urinary Medicine
patients, on hard drives sold on an Internet auction site in October and
November 2010
• The Data breach occurred when an individual engaged by the Trust’s IT
service provider, was tasked to destroy approximately 1000 hard drives
• The individual sold 4 hard drives on an internet auction in December
2010
40. 40
Offences and Penalties
• If a body corporate commits an offence under the PDPA, any person who at the
time of the offence was a director, CEO, COO, Manager etc may be charged
jointly or severally with the company
• Liability also is attached to Senior Management for acts or omissions of any
employee acting in the course of their employment.
• Section 5 (1)
Anyone who contravenes the Personal Data Protection Principles commits and
offence and shall, on conviction, be liable to a fine not exceeding RM300,000
or to imprisonment for a term not exceeding 2 years or to both
Penalties for other offences ranges from RM100k to RM500k with
imprisonment ranging from 1 – 3 years
Eg. For unlawful collection or selling of PD – 500k and 3 years