Ethics Flashcards
- MORAL PRINCIPLES THAT GOVERN A PERSON’S BEHAVIOR
ETHICS
COVERS ISSUES ON HONORABLE ACTIONS, AND PROPER AND IMPROPER BEHAVIORS IN THE FIELD OF HEALTH CARE
Ethics in Health Informatics
APPLICATION OF THE PRINCIPLES OF ETHICS IN THE DOMAIN OF HEALTH INFORMATICS (I.E. GENERAL, INFORMATICS, SOFTWARE ETHICS)
HEALTH INFORMATION ETHICS
Main Aspects of Information Ethics
General Ethics
Informatics Ethics
Software Ethics
In public health, _______ guide the reasoning and decision-making of all people and organization involved in health care.
general ethic
Two ethical principles a professional must uphold:
Autonomy
Beneficence and Non-maleficence
General Ethics:
"”do good and do no harm”
Beneficence and Non-maleficence
- usage of stored data in the EHR
Beneficence
- how the stored data is protected
Non-maleficence
are undeniably a powerful tool to store raw data which can be useful in research to benefit patient + society
CDRs
Clinical Data Repositories
General ethics is always under threat of________ causing damage
system failures
Remedy for system failures in general ethics:
multiple backups (for fast and easy recovery)
highest level of data security tools (to deter vulnerabilities)
Informatics Ethics
SEVEN (7) PRINCIPLES
Principle of Information-Privacy and Disposition
Principle of Openness
Principle of Security
Principle of Access
Principle of Legitimate Infringement
Principle of the Least Intrusive
Alternative
Principle of Accountability
Ensure individual has control over the collection, access, use, communication, manipulation, storage, linkage, and disposition
Principle of Information-Privacy and Disposition
Disclosure to the individual in an appropriate and timely manner.
Principle of Openness
Protection of data against unauthorized access, misuse, modification, manipulation, loss, or unauthorized destruction.
Principle of Security
Authorized individuals have the right to access and correct data.
Principle of Access
Right to privacy and control over personal data should follow rules of democratic society and by equal rights of others.
Principle of Legitimate Infringement
Any infringement of data should be done with the least amount of Interference minding the rights of the affected parties.
Principle of the Least Intrusive Alternative
Any infringement must be justified to the concerned individuals in a timely and appropriate fashion
Principle of Accountability
Defined as the ethical duties and responsibilities of software developers to the stakeholders (society, institution and employees, and the profession
Software Ethics
- STATE OR CONDITION OF BEING FREE FROM PUBLIC OBSERVATION
PRIVACY
- UNINTENDED DISCLOSURE OR PROTECTION OF INFORMATION
CONFIDENTIALITY
should be upheld in confidence by authorized parties no matter what the circumstance
Health care information
Protection of________ and _________ is non-negotiable because it is a duty that does not fluctuate
privacy and confidentiality
_________ falls to anyone handling the information: system designers, maintenance personnel, administration, physicians, nurses, other hospital staff
Obligation
are the solutions and tools which may be utilized to implement security policies at different levels of the organization
Safeguards
Levels of security in HIS
Administrative level
Physical level
Technical level
- implemented by the management as organization-wide policies and procedures
Administrative level
- protect equipment, systems, and locations
Physical level
- protect software and database access and control
Technical level
Levels of Security in HIS
Follow the________ principle
cost-benefit principle
Five (5) Key Functions of Technological Security Tools From the
National Research Council (1997)
Five (5) Key Functions of Technological Security Tools
From the National Research Council (1997):
Availability
Accountability
Perimeter Identification
Comprehensibility and Control
Controlling Access
Levels of Security in LIS
Register Patient
Order Tests
Collect samples
Receive samples
Run samples
Review results
Release results
Report results
Philippine Data Privacy Act of 2012
(RA 10173)
(RA 10173)
Philippine Data Privacy Act of 2012
RA 10173
SIGNED BY THEN-PHILIPPINE PRESIDENT,_________, ON_________
BENIGNO AQUINO III
AUGUST 15, 2012
RA 10173 IS MODELED AFTER THE
EU DATA PROTECTION DIRECTIVE AND THE ASIA-PACIFIC ECONOMIC COOPERATION (APEC) PRIVACY FRAMEWORK
Philippine total IT expenditure (2016):
$4.4 billion
Filipino social media usage:
(Linkedln)
(Twitter) and
(Facebook)
3.5 million
13 million
42.1 million
Aim of the Data Privacy Act:
“to protect the fundamental human right of privacy of communication while’ ensuring free flow of information to promote innovation and growth” (Ch. 1, Sec. 2)
Target population:
individuals and legal entities in the business of processing personal information
Law applies to all________, regardless of place of residence (extraterritorially)
Filipinos
Main principles of Data Privacy Act
Transparency
Legitimacy of purpose
Proportionality
One of the major elements of Data Privacy Act:
CONSENT