Computer Breach

For the past 15 years, epidemiologist Bonnie Yankaskas has received federal funding to maintain and analyze a database of mammography results from North Carolina women. Two years ago, her employer, the University of North Carolina School of Medicine, discovered that her server’s security had been compromised.

Although Dr. Yankaskas had hired a computer expert to oversee the database, the medical school ultimately found her responsible for the breach as project PI. The school first tried to fire the professor. Then they tried to demote her. In a settlement, Dr. Yankasas will retain her title and salary, but retire at the end of the year.

Even without evidence of harm to the subjects in the database, it is clear that the PI is responsible for training and overseeing the personnel who manage the data. Along with the prestige of conducting important research comes the responsibility for maintaining ethical standards.

Tags: , ,

2 Responses to “Computer Breach”

  1. Youre so cool! I dont suppose Ive learn anything like this before. So nice to seek out someone with some unique thoughts on this subject. realy thanks for beginning this up. this website is one thing that’s wanted on the internet, someone with slightly originality. useful job for bringing something new to the web!

  2. siperzi says:

    Our hp pavilion dv6000 battery have passed strict quality assurance procedures to achieve international standards such as CE, UL Listed, and/or ISO9001/9002 certification. Thus, the life these second hand batteries spent on the forklift is very short and when they aren’t in use, they are kept float charged in a storage room. Lastly, you might have a problem with free wires within the PS3 controller. As the store shelves sit ransacked with no more batteries, I wonder what people are even going to use them for. Another keyword – ‘portable’ in ‘LED rechargeable portable worklight’ makes it an ideal companion for the mobile workman.