14: ETHICS, PRIVACY, AND SECURITY Flashcards

1
Q
  1. A program should undergo appropriate evaluation prior to use in clinical practice. It should perform efficiently at an acceptable financial and time frame cost.
A

Ethical principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Adequate training and instruction should be completed before proceeding to the implementation.
A

Ethical principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. A qualified health professional should be assigned to handle concerns regarding uses, licenses, and other concerns. The software system’s applications should not replace functions as decision-making.
A

Ethical principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____________ guide the reasoning and decision-making of all people and organization involved in health care.

A

GENERAL ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two ethical principles a health professional

A
  1. Autonomy
  2. Beneficence and Non-maleficence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____________ is about the ethical behavior expected from an individual assigned to handle information.

A

INFORMATICS ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______________ are solutions and tools which may be utilized to implement security policies at different levels of health organization such as administrative, physical, and technical.

A

Safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • provides that consent must be documented and given prior to the collection of all forms of personal data; and the collection must be declared, specified, and used for legitimate purpose.
  • The subject must be notified about the purpose and extent of data processing, with details specifying the need for automated processing, profiling, direct marketing, or sharing.
A

PHILIPPINE DATA PRIVACY ACT OF 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Unauthorized processing
  • Processing for unauthorized purposes
  • Negligent access
  • Improper disposal
  • Unauthorized access or intentional breach
  • Concealment of breach involving sensitive personal information
  • Unauthorized disclosure; and
  • Malicious disclosure
A

Violations of the Data Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly