
{"version":"1.0","provider_name":"Fundaci\u00f3 TIC Salut i Social","provider_url":"https:\/\/ticsalutsocial.atoom.space\/en\/","author_name":"whiterabbit","author_url":"https:\/\/ticsalutsocial.atoom.space\/en\/author\/whiterabbit\/","title":"Ethical and responsible use: managing data security - Fundaci\u00f3 TIC Salut i Social","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"LrT2LJDMRk\"><a href=\"https:\/\/ticsalutsocial.atoom.space\/en\/noticia\/ethical-and-responsible-use-managing-data-security\/\">Ethical and responsible use: managing data security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ticsalutsocial.atoom.space\/en\/noticia\/ethical-and-responsible-use-managing-data-security\/embed\/#?secret=LrT2LJDMRk\" width=\"600\" height=\"338\" title=\"&#8220;Ethical and responsible use: managing data security&#8221; &#8212; Fundaci\u00f3 TIC Salut i Social\" data-secret=\"LrT2LJDMRk\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/ticsalutsocial.atoom.space\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/ticsalutsocial.atoom.space\/wp-content\/uploads\/2019\/07\/nasa-_sfjhrpzjhs-unsplash-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1704,"description":"Data management, security and cyber security, or the management and ethical use of the same are some of the issues which will keep us occupied in the coming years in trying to improve the management of healthcare services. To find out how we are doing in this respect, we bring you an interview with Dr [&hellip;]"}