01/10 - Ethics and Professionalism Flashcards
What are Duke’s core supporting values?
Excellence Safety Integrity Diversity Teamwork
Should you give out diagnostic information to a surgeon who brings you a frozen section and asks you to gross it?
NO! Never give out diagnostic information
What is the definition of medical ethics?
The study of moral values and judgments as they apply to medicine
What are the six core values of medical ethics?
Autonomy Beneficence Non-maleficence Justice Dignity Truthfulness and honesty
What are some common issues that come up with respect to clinical ethical issues?
Informed consent Truth telling Confidentiality End-of-life care Pain relief Patient's rights
What does HIPAA stand for?
Health Insurance Portability and Accountability Act
What is addressed in Title I of HIPAA?
Protecting health insurance coverage for workers and families when they change or lose their jobs
What is addressed in Title II of HIPAA?
Requires the establishment of standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers
What is the purpose of the Administrative Simplification rules?
To increase the efficiency of the health care system, and to create standard for use and dissemination of health care information
What issues are addressed by the Privacy Rule?
Regulations for use and disclosure of Protected Health Information (PHI)
Gives individuals the right to request correction of inaccurate PHI
Requires “covered entities” to notify individuals of use of their PHI
What is the Security Rule?
A part of HIPAA that deals specifically with Electronic Protected Health Information (EPHI), and addresses security safeguards
What are the three types of security safeguards covered by the Security Rule?
Administrative
Physical
Technial
What are some administrative safeguards?
Written privacy procedures and policies
Ongoing training programs
Contingency plans
Internal audits
What are some physical safeguards?
Controlling physical access to PHI
Control of access to and introduction/removal of hardware and software
Proper workstation and computer use
What are some technical safeguards?
Control of access to computer systems
Protection of communications transmitted over open networks
Encryption, corroboration, and authentication of data
Documentation