Ethics, Privacy, and Security Flashcards

1
Q

This refers to a violation, breach, or unauthorized act against a certain principle.

A

Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This principle implies that the harm should not be disproportionate to the benefit of the treatment.

A

non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This principle of the least intrusive alternative is closely associated with this principle.

A

Principle of legitimate infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This principle information privacy is adjunct to the principle.

A

Principle of Information-privacy and disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This connotes acts or personal qualities of mercy, kindness, generosity, and charity.

A

Beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following may limit the principle of autonomy of a patient? Select all that apply.

A

Being a minor

Psychological Impairment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It involves balancing the benefits of treatment against the risk and costs involved.

A

Beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

“Respecting the principles of Beneficence and non-maleficence may in certain circumstances mean failing to respect a person’s autonomy”

T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This principle believes that all persons have a duty to prevent harm to other persons insofar as it lies within their power to do without undue harm to themselves.

A

non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is suggestive of altruism, love, humanity, and promoting the good of others.

A

Beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is a decision-making problem between two possible moral imperatives. neither of which is ambiguously acceptable or preferable

A

Ethical Dilemma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three main aspects of health informatics ethics?

A

General Ethics
Informatics
Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What principle is described by the statement “We have an obligation to respect the decisions made by our people concerning their own lives”

A

Autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It means avoiding the causation of harm

A

Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This principle implies that the harm should not be disproportionate to the benefit of the treatment.

A

non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This principle states that all persons have a duty to advance the good of others where the nature of this good is in keeping with fundamental and ethically defensive values of the affected party.

A

Principle of Beneficence

17
Q

This principle states that all persons have a fundamental right to privacy, and hence control over the collection, storage, access, use, communication, manipulation and disposition of data about themselves

A

Principle of Information-privacy and disposition

18
Q

The collection, storage, access, use, communication, manipulation and disposition of personal data must be disclosed in an appropriate and timely fashion to the subject of those data

A

Principle of Openness

19
Q

Different levels of health organization

A

Administrative
Physical
Technical

20
Q

Administrative safeguard

A

Continuous training for the users of LIS

Periodic review of standards used to identify results that should be flagged

Review of the authorization and supervision policies

Strict implementation of the rules and regulations for the testing procedures

Release and dissemination of guidelines on proper disposal of laboratory specimens

Enforcement of strict policies on the proper use of laboratory workstations

Requiring appropriate disciplinary measures as needed

21
Q

Physical safeguards

A

Ensuring the periodic maintenance of laboratory equipment

Having biometrics or other security protocols for laboratory access

Maintenance of controlled temperature both for equipment and specimens

Use of contingency operations plan

Use of appropriate personal laboratory safety equipment

22
Q

Technical safeguards

A

Presence of automated identity confirmation procedures for users requesting access

Regular updating of passwords

Requiring different authorizations based on their level

Capability of the unit to automatically log off after long periods of inactivity

23
Q

Which of the following are violations of data privacy act? Select all that apply.

A

Unauthorized access or intentional breach

Processing for unauthorized purposes

Negligent access

Improper disposal

Concealment of research involving sensitive personal information

Unauthorized disclosure

Malicious disclosure

24
Q

Which of the following key functions are served by the national research Council? Select all that apply.

A
Availability
accountability
perimeter identification
controlling access
comprehensibility and control
25
Q

This emphasizes the technological security tools are essential components of modern distributed healthcare information systems

A

The National Research Council (1997)

26
Q

This states that the collection of data must be declared, justified, and used for legitimate purposes.

A

Philippine Data Privacy Act of 2012

27
Q

_______ training & instruction should be completed before proceeding to the implementation.

A

Adequate

28
Q

A program should undergo appropriate _______prior to use in clinical practice

A

Evaluation