Ethics, Privacy, and Security Flashcards
This refers to a violation, breach, or unauthorized act against a certain principle.
Infringement
This principle implies that the harm should not be disproportionate to the benefit of the treatment.
non-maleficence
This principle of the least intrusive alternative is closely associated with this principle.
Principle of legitimate infringement
This principle information privacy is adjunct to the principle.
Principle of Information-privacy and disposition
This connotes acts or personal qualities of mercy, kindness, generosity, and charity.
Beneficence
Which of the following may limit the principle of autonomy of a patient? Select all that apply.
Being a minor
Psychological Impairment
It involves balancing the benefits of treatment against the risk and costs involved.
Beneficence
“Respecting the principles of Beneficence and non-maleficence may in certain circumstances mean failing to respect a person’s autonomy”
T/F
False
This principle believes that all persons have a duty to prevent harm to other persons insofar as it lies within their power to do without undue harm to themselves.
non-maleficence
It is suggestive of altruism, love, humanity, and promoting the good of others.
Beneficence
This is a decision-making problem between two possible moral imperatives. neither of which is ambiguously acceptable or preferable
Ethical Dilemma
What are the three main aspects of health informatics ethics?
General Ethics
Informatics
Software
What principle is described by the statement “We have an obligation to respect the decisions made by our people concerning their own lives”
Autonomy
It means avoiding the causation of harm
Non-maleficence
This principle implies that the harm should not be disproportionate to the benefit of the treatment.
non-maleficence
This principle states that all persons have a duty to advance the good of others where the nature of this good is in keeping with fundamental and ethically defensive values of the affected party.
Principle of Beneficence
This principle states that all persons have a fundamental right to privacy, and hence control over the collection, storage, access, use, communication, manipulation and disposition of data about themselves
Principle of Information-privacy and disposition
The collection, storage, access, use, communication, manipulation and disposition of personal data must be disclosed in an appropriate and timely fashion to the subject of those data
Principle of Openness
Different levels of health organization
Administrative
Physical
Technical
Administrative safeguard
Continuous training for the users of LIS
Periodic review of standards used to identify results that should be flagged
Review of the authorization and supervision policies
Strict implementation of the rules and regulations for the testing procedures
Release and dissemination of guidelines on proper disposal of laboratory specimens
Enforcement of strict policies on the proper use of laboratory workstations
Requiring appropriate disciplinary measures as needed
Physical safeguards
Ensuring the periodic maintenance of laboratory equipment
Having biometrics or other security protocols for laboratory access
Maintenance of controlled temperature both for equipment and specimens
Use of contingency operations plan
Use of appropriate personal laboratory safety equipment
Technical safeguards
Presence of automated identity confirmation procedures for users requesting access
Regular updating of passwords
Requiring different authorizations based on their level
Capability of the unit to automatically log off after long periods of inactivity
Which of the following are violations of data privacy act? Select all that apply.
Unauthorized access or intentional breach
Processing for unauthorized purposes
Negligent access
Improper disposal
Concealment of research involving sensitive personal information
Unauthorized disclosure
Malicious disclosure
Which of the following key functions are served by the national research Council? Select all that apply.
Availability accountability perimeter identification controlling access comprehensibility and control
This emphasizes the technological security tools are essential components of modern distributed healthcare information systems
The National Research Council (1997)
This states that the collection of data must be declared, justified, and used for legitimate purposes.
Philippine Data Privacy Act of 2012
_______ training & instruction should be completed before proceeding to the implementation.
Adequate
A program should undergo appropriate _______prior to use in clinical practice
Evaluation