Ethics, Data Privacy and Security in Health Informatics Flashcards

1
Q

fact or cap: healthcare is rapidly adopting technology

A

fax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

meaning of HIE

A

health informatics ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

applies ethical principles to health informatics

A

Health Informatics ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HIE focuses on three areas which are???

A

healthcare
informatics
software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

unsay goal sa HIE?

A

to ensure that the use of technology enhances healthcare while upholding ethical standards eklabush

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

enumerate the fundamental values of healthcare

A

autonomy
beneficence
non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

patients have the right to make decisions about their own healthcare

A

autonomy malamang

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

health professionals should do good by using data for research and improved patient care

A

beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

healthcare proffessionals should do no harm by protecting patient data from breaches and misuse

A

non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what’s the meaning of IMIA

A

The International Medical Informatics Association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

mnemonics of the seven principles for data handling according to IMIA

A

O - opennes
S - security
A - access
L - legitimate infringement
L - least intrusive alternative
A - accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

software developers have ethical responsibilities to:
1.______
2.______
3.______

A
  1. society
  2. institution and employees
  3. the proffession
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

enumerate the three categories of security measures

A

administrative (policies & procedures)

physical (protecting facilities and equipment)

technical (technological solutions for data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this emphasized the importance of technological security tools

A

NRC (National Research Council) report 1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the five key functions emphasized by NRC report 1997

A
  1. availability
  2. accountability
  3. perimeter identification
  4. controlling access
  5. comprehensibility and control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ensuring information is readily accessible

A

availability

17
Q

holding providers responsible for data access

A

accountability

18
Q

defining and controlling access boundaries

A

perimeter identification

19
Q

limiting access to essential information

A

controlling access

20
Q

ensuring understanding and control over privacy

A

comprehensibility and control

21
Q

enumerate the LIS care churva (katong 9 kabuok)

A
  1. patient registration
  2. test ordering
  3. sample collection
  4. receive sample
  5. run sample
  6. review results
  7. release results
  8. report results
22
Q

identify LIS: upon admission data is automatically transferred from HIS to LIS

A

patient registration

23
Q

physician electronically order test through clinical information system (CIS), which are automatically sent to LIS

A

test ordering

24
Q

The LIS generates barcoded labels for sample collection, streamlining the process and ensuring accurate identification

A

sample collection

25
Q

upon arrival at the lab, samples are scanned and their status is updated in the LIS

A

receive sample

26
Q

The LIS transmit the test order to analyzer, which automaticall performs the tests based on the recieved information

A

run sample

27
Q

the LIS flags critical values for immediate attention by the technologist

A

Review Results

28
Q

technologists review and release results, with the LIS automatically releasing normal results or results within specific range

A

Release results

29
Q

Results are automatically transmitted to the CIS providing physicians with access to the information

A

Reporting results