Ethics Flashcards

1
Q
  • MORAL PRINCIPLES THAT GOVERN A PERSON’S BEHAVIOR
A

ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

COVERS ISSUES ON HONORABLE ACTIONS, AND PROPER AND IMPROPER BEHAVIORS IN THE FIELD OF HEALTH CARE

A

Ethics in Health Informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

APPLICATION OF THE PRINCIPLES OF ETHICS IN THE DOMAIN OF HEALTH INFORMATICS (I.E. GENERAL, INFORMATICS, SOFTWARE ETHICS)

A

HEALTH INFORMATION ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Main Aspects of Information Ethics

A

General Ethics
Informatics Ethics
Software Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In public health, _______ guide the reasoning and decision-making of all people and organization involved in health care.

A

general ethic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two ethical principles a professional must uphold:

A

Autonomy
Beneficence and Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

General Ethics:

"”do good and do no harm”

A

Beneficence and Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • usage of stored data in the EHR
A

Beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • how the stored data is protected
A

Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

are undeniably a powerful tool to store raw data which can be useful in research to benefit patient + society

A

CDRs

Clinical Data Repositories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

General ethics is always under threat of________ causing damage

A

system failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Remedy for system failures in general ethics:

A

multiple backups (for fast and easy recovery)

highest level of data security tools (to deter vulnerabilities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Informatics Ethics
SEVEN (7) PRINCIPLES

A

Principle of Information-Privacy and Disposition

Principle of Openness

Principle of Security

Principle of Access

Principle of Legitimate Infringement

Principle of the Least Intrusive
Alternative

Principle of Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ensure individual has control over the collection, access, use, communication, manipulation, storage, linkage, and disposition

A

Principle of Information-Privacy and Disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disclosure to the individual in an appropriate and timely manner.

A

Principle of Openness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protection of data against unauthorized access, misuse, modification, manipulation, loss, or unauthorized destruction.

A

Principle of Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authorized individuals have the right to access and correct data.

A

Principle of Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Right to privacy and control over personal data should follow rules of democratic society and by equal rights of others.

A

Principle of Legitimate Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Any infringement of data should be done with the least amount of Interference minding the rights of the affected parties.

A

Principle of the Least Intrusive Alternative

20
Q

Any infringement must be justified to the concerned individuals in a timely and appropriate fashion

A

Principle of Accountability

21
Q

Defined as the ethical duties and responsibilities of software developers to the stakeholders (society, institution and employees, and the profession

A

Software Ethics

22
Q
  • STATE OR CONDITION OF BEING FREE FROM PUBLIC OBSERVATION
23
Q
  • UNINTENDED DISCLOSURE OR PROTECTION OF INFORMATION
A

CONFIDENTIALITY

24
Q

should be upheld in confidence by authorized parties no matter what the circumstance

A

Health care information

25
Protection of________ and _________ is non-negotiable because it is a duty that does not fluctuate
privacy and confidentiality
26
_________ falls to anyone handling the information: system designers, maintenance personnel, administration, physicians, nurses, other hospital staff
Obligation
27
are the solutions and tools which may be utilized to implement security policies at different levels of the organization
Safeguards
28
Levels of security in HIS
Administrative level Physical level Technical level
29
- implemented by the management as organization-wide policies and procedures
Administrative level
30
- protect equipment, systems, and locations
Physical level
31
- protect software and database access and control
Technical level
32
Levels of Security in HIS Follow the________ principle
cost-benefit principle
33
Five (5) Key Functions of Technological Security Tools From the
National Research Council (1997)
34
Five (5) Key Functions of Technological Security Tools From the National Research Council (1997):
Availability Accountability Perimeter Identification Comprehensibility and Control Controlling Access
35
Levels of Security in LIS
Register Patient Order Tests Collect samples Receive samples Run samples Review results Release results Report results
36
Philippine Data Privacy Act of 2012
(RA 10173)
37
(RA 10173)
Philippine Data Privacy Act of 2012
38
RA 10173 SIGNED BY THEN-PHILIPPINE PRESIDENT,_________, ON_________
BENIGNO AQUINO III AUGUST 15, 2012
39
RA 10173 IS MODELED AFTER THE
EU DATA PROTECTION DIRECTIVE AND THE ASIA-PACIFIC ECONOMIC COOPERATION (APEC) PRIVACY FRAMEWORK
40
Philippine total IT expenditure (2016):
$4.4 billion
41
Filipino social media usage: (Linkedln) (Twitter) and (Facebook)
3.5 million 13 million 42.1 million
42
Aim of the Data Privacy Act:
"to protect the fundamental human right of privacy of communication while' ensuring free flow of information to promote innovation and growth" (Ch. 1, Sec. 2)
43
Target population:
individuals and legal entities in the business of processing personal information
44
Law applies to all________, regardless of place of residence (extraterritorially)
Filipinos
45
Main principles of Data Privacy Act
Transparency Legitimacy of purpose Proportionality
46
One of the major elements of Data Privacy Act:
CONSENT