Information Technology Management in Healthcare Organizations: Part 1 (Octobe...
Â
Personal Data Protection Act and Human Subjects Research and Patients' Health Information (August 7, 2020)
1. 1
āļ.āļĢ.āļ.āļāļļāđāļĄāļāļĢāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨ āļ.āļĻ. 2562 āļāļąāļ
āļāļēāļāļ§āļīāļāļąāļĒāđāļāļĄāļāļļāļĐāļĒāđāđāļĨāļ°āļāđāļāļĄāļđāļĨāļŠāļļāļāļ āļēāļāļāļāļāļāļđāđāļāđāļ§āļĒ
āļāļ.āļāļ§āļāļĢāļĢāļ āļāļĩāļĢāļ°āļāļąāļĄāļāļĢāļāļąāļāļāļļāđ
āļĢāļāļāļāļāļāļāļĩāļāđāļēāļĒāļāļāļīāļāļąāļāļīāļāļēāļĢ āđāļĨāļ°āļāļēāļāļēāļĢāļĒāđāļ āļēāļāļ§āļīāļāļēāļĢāļ°āļāļēāļāļ§āļīāļāļĒāļēāļāļĨāļīāļāļīāļāđāļĨāļ°āļāļĩāļ§āļŠāļāļīāļāļī
āļāļāļ°āđāļāļāļĒāļĻāļēāļŠāļāļĢāđāđāļĢāļāļāļĒāļēāļāļēāļĨāļĢāļēāļĄāļēāļāļīāļāļāļĩ
āļāļąāļāļ§āļīāļāļēāļāļēāļĢāļāđāļēāļāļŠāļēāļĢāļŠāļāđāļāļĻāļŠāļļāļāļ āļēāļ
7 āļŠāļīāļāļŦāļēāļāļĄ 2563
Except content reproduced from others, used here under Fair Use, that are copyrighted by respective owners.
7. 7
The Day We All WannaCryâed
http://www.mirror.co.uk/news/uk-news/ransomware-nhs-cyber-attack-live-10409420
https://cdn.securelist.com/files/2017/05/wannacry_05.png
10. 10
User Security & Privacy
So, two informaticians walk
into a bar...
The bouncer says, "What's
the password."
One says, "Password?"
The bouncer lets them in.
Credits: @RossMartin & AMIA (2012)
14. 14
Hippocratic Oath
â...What I may see or hear in the course of
treatment or even outside of the treatment in
regard to the life of men, which on no account one
must spread abroad, I will keep myself holding
such things shameful to be spoken about...â
15. 15
Relevant Ethical Principles
Autonomy (āļŦāļĨāļąāļāđāļāļāļŠāļīāļāļāļīāđ/āļāļ§āļēāļĄāđāļāđāļāļāļīāļŠāļĢāļ°āļāļāļāļāļđāđāļāđāļ§āļĒ)
Beneficence (āļŦāļĨāļąāļāļāļēāļĢāļĢāļąāļāļĐāļēāļāļĢāļ°āđāļĒāļāļāđāļŠāļđāļāļŠāļļāļāļāļāļāļāļđāđāļāđāļ§āļĒ)
Non-maleficence (āļŦāļĨāļąāļāļāļēāļĢāđāļĄāđāļāļēāļāļąāļāļāļĢāļēāļĒāļāđāļāļāļđāđāļāđāļ§āļĒ)
âFirst, Do No Harm.â