Data Privacy and Security in Clinical Data Management
ClinosolIndia
812 views
15 slides
Aug 09, 2023
Slide 1 of 15
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
About This Presentation
Data privacy and security are of paramount importance in clinical data management to ensure the confidentiality, integrity, and protection of sensitive patient information and research data. Maintaining robust data privacy and security measures is essential for complying with regulatory requirements...
Data privacy and security are of paramount importance in clinical data management to ensure the confidentiality, integrity, and protection of sensitive patient information and research data. Maintaining robust data privacy and security measures is essential for complying with regulatory requirements and maintaining the trust of patients, researchers, and stakeholders. Here's how data privacy and security can be ensured in clinical data management
Size: 1.36 MB
Language: en
Added: Aug 09, 2023
Slides: 15 pages
Slide Content
Welcome Data Privacy and Security in Clinical Data Management 10/18/2022 www.clinosol.com | follow us on social media @ clinosolresearch 1 NAME;- CH.KEERTHANA QUALIFICATION ;-M.PHARMACY STUDENT ID;-169
DATA PRIVACY DATA SECURITY DATA SECURITY V/S DATA PRIVACY DATA SECURITY AND PRIVACY METHODS CONCULATION REFERENCES 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 2 INTRODUCTION
DATA PRIVECY Data privacy is a guideline for how data should be collected or handled, based on its sensitivity and importance. Data privacy is typically applied to personal health information (PHI) and personally identifiable information (PII) This includes;- social security or ID numbers, names, birthdates, medical records and contact information. 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 3 INTRODUCTION
Data security is the defense of digital information against internal and external, malicious and accidental threats. Organizations have adopted countless security measures and data security tools to guarantee data security For example, An MFA system might use a traditional username and password combined with a code that is sent to the user's smart phone via text message. 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 4 Data security
10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 5 DATA SECURITY V/S DATA PRIVACY
Methods;- Data Security Data Integrity Need of Data Security Physical Security Software Safeguards IDS User ID Encryption Digital Certificate Copyright Ethical Issues Legal Issues 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 6 Data Security and Privacy Methods
Data security is basically the process of keeping certain information private. It involves the use of various methods to make sure that data is kept confidential and safe. Data security ensures the integrity and the privacy of data, as well as preventing the loss or corruption of data. Data Integrity When data is processed it is usually changed in some way or another Data integrity describes the correctness of this change Safeguards are needed to make sure that the data has integrity by detecting any mistakes or malicious change to the data 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 7 Data Security
Many businesses hold very important and confidential data Hence security of data is extremely important Data must be safeguarded all the time Software Safeguards There are many software measures which can protect data. The following explains some of the most common approaches used now a days 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 8 Need of Data Security
The most obvious choice of protecting data is to keep it in a safe locked room/building Protected rooms can be safeguarded by ID card scanning Biometrics (retina-scan, fingerprint- scanning) Using a safe IDS ( stands for Intrusion Detection System) IDS monitors the operation of the network to detect illegal operations The system may be server-based - detecting attacks on the operation of the file-server network based, watching the pattern of traffic across the network 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 9 PHYSICAL SECURITY
This is a unique name or code used to identify a specific user when gaining access (logging in) Methods of using a user ID Passwords Personal Identification Devices Personal Identification Numbers (PIN) Encryption Encryption makes data in a computer system illegible and makes data look meaningless An encryption key is a code used for the encryption process A decryption key is needed before the data can be changed back to its original form 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 10 User ID (User ID stands for User Identification)
The certification authority, also known as a trusted service provider or a trusted third party, is a business that provides online certification facilities Copyright Copyright is a protection that covers published and unpublished Literary Scientific artistic works Copyright laws grant only the creator the right to reproduce, prepare derivative works, distribute, perform and display the work publicly. 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 11 Digital Certificate
When you purchase software, you do not become the owner of the copyright, you are purchasing the right to use the software under certain restrictions Legal Issues The copyright owner may choose between Actual damages - which include the amount he/she has lost because of your violation Legal damages - which can be as much as $150,000 for each program copied. In addition, the government can criminally prosecute you for copyright infringement, you can be fined up to $250,000, or sentenced to jail for up to five years, or both! 10/18/2022 www.clinosol.com | follow us on social media @ clinosolresearch 12 Ethical Issues
C ollection of data continues to expand rapidly, growing datasets into longer-term repositories with increasing value. When datasets include potentially identifiable personal information, steps to prevent disclosure of this information can limit the extent to which researchers can analyze data with granular and accurate enough calculations. There are no silver bullets in disclosure limitation, and no single privacy-enhancing technique or technology will completely remove privacy risks. 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 13 Conclusion
1. Adams RJ, Appleton SL, Gill TK, Taylor AW, Wilson DH, Hill CL:“Cause for concern in the use of non-steroidal anti-inflammatory medications in the community-a population-based study”; BMC FamPract ;2011;12(1):1-8. 2.Thomas J, Straus WL, Bloom BS:“Over-the-counter no steroidal anti-inflammatory drugs and risk of gastrointestinal symptoms ”. Am J Gastroenterol; 2002;97(9):2215-2219. 3.Wood AJ, Brass EP.“Changing the status of drugs from prescription to over-the-counter availability ”. N Engle J Med, 2001;345(11):810-816. 4.Guyatt GH, Oman AD, Kunz R, et al: “Rating quality of evidence and strength of recommendations: going from evidence to recommendations”. BMJ. 2008;(284),1-8 5.Alamanos Y, Vulgar PV, Dross AA: “Incidence and prevalence of rheumatoid arthritis, based on the 1987 American College of Rheumatology criteria”: a systematic review. Semen Arthritis Rheum. 2006;(36):90-100. 10/18/2022 www.clinosol.com | follow us on social media @ clinosolresearch 14 REFRANCES
Thank You! www.clinosol.com (India | Canada) 9121151622/623/624 [email protected] 10/18/2022 www.clinosol.com | follow us on social media @clinosolresearch 15