Ethics, Data Privacy and Security in Health Informatics Flashcards

1
Q

fact or cap: healthcare is rapidly adopting technology

A

fax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

meaning of HIE

A

health informatics ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

applies ethical principles to health informatics

A

Health Informatics ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HIE focuses on three areas which are???

A

healthcare
informatics
software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

unsay goal sa HIE?

A

to ensure that the use of technology enhances healthcare while upholding ethical standards eklabush

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

enumerate the fundamental values of healthcare

A

autonomy
beneficence
non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

patients have the right to make decisions about their own healthcare

A

autonomy malamang

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

health professionals should do good by using data for research and improved patient care

A

beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

healthcare proffessionals should do no harm by protecting patient data from breaches and misuse

A

non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what’s the meaning of IMIA

A

The International Medical Informatics Association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

mnemonics of the seven principles for data handling according to IMIA

A

O - opennes
S - security
A - access
L - legitimate infringement
L - least intrusive alternative
A - accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

software developers have ethical responsibilities to:
1.______
2.______
3.______

A
  1. society
  2. institution and employees
  3. the proffession
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

enumerate the three categories of security measures

A

administrative (policies & procedures)

physical (protecting facilities and equipment)

technical (technological solutions for data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this emphasized the importance of technological security tools

A

NRC (National Research Council) report 1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the five key functions emphasized by NRC report 1997

A
  1. availability
  2. accountability
  3. perimeter identification
  4. controlling access
  5. comprehensibility and control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ensuring information is readily accessible

A

availability

17
Q

holding providers responsible for data access

A

accountability

18
Q

defining and controlling access boundaries

A

perimeter identification

19
Q

limiting access to essential information

A

controlling access

20
Q

ensuring understanding and control over privacy

A

comprehensibility and control

21
Q

enumerate the LIS care churva (katong 9 kabuok)

A
  1. patient registration
  2. test ordering
  3. sample collection
  4. receive sample
  5. run sample
  6. review results
  7. release results
  8. report results
22
Q

identify LIS: upon admission data is automatically transferred from HIS to LIS

A

patient registration

23
Q

physician electronically order test through clinical information system (CIS), which are automatically sent to LIS

A

test ordering

24
Q

The LIS generates barcoded labels for sample collection, streamlining the process and ensuring accurate identification

A

sample collection

25
upon arrival at the lab, samples are scanned and their status is updated in the LIS
receive sample
26
The LIS transmit the test order to analyzer, which automaticall performs the tests based on the recieved information
run sample
27
the LIS flags critical values for immediate attention by the technologist
Review Results
28
technologists review and release results, with the LIS automatically releasing normal results or results within specific range
Release results
29
Results are automatically transmitted to the CIS providing physicians with access to the information
Reporting results