ETHICS, PRIVACY, AND SECURITY Flashcards
Application of the principles
of ethics to the domain of
health informatics
Health informatics ethics
Defined as either allowing individuals to make their own decisions in response to a particular societal context, or as the idea that no one human person does not have the authority nor should have power over another human person
autonomy
Defined as “do good” and “do no harm”, respectively
Beneficence and Non-maleficence
Conduction of groundbreaking biomedical
and public health research
principle of beneficence in health informatics
- Temporary Outage
- Total System Failure
- Data Security
these are under what principle in health informatics?
principle of non-maleficence in health informatics
the control over the collection, storage, access, use, communication, manipulation,
linkage and disposition of data
about themselves
Principle of Information-Privacy
and Disposition
The collection, storage, access, use, communication, manipulation, linkage and disposition of personal data must be disclosed in an appropriate and timely fashion to the subject or subjects of those data
• Principle of Openness
Data that have been legitimately collected about persons or groups of persons should be protected by all reasonable and appropriate measures against loss degradation, unauthorized destruction, access, use, manipulation, linkage, modification or communication
Principle of Security
The subjects of electronic health records have the right of access to those records and the right to correct them with respect to its accurateness, completeness and relevance.
Principle of Access
The fundamental right of privacy and of control is conditioned only by the legitimate, appropriate and relevant data-needs of a free, responsible and democratic society, and by the equal and competing rights of others
Principle of Legitimate
Infringement
Any infringement of the privacy rights of a person or group of persons, and of their right of control over data about them, may only occur in the least intrusive fashion and with a minimum of interference with the rights of the affected parties.
Principle of the Least Intrusive
Alternative
Any infringement of the privacy rights of a person or group of persons, and of the right to control over data about them, must be justified to the latter in good time and in an appropriate fashion.
Principle of Accountability
__________ generally applies to
individuals and their aversion to eavesdropping
privacy
_____________ is more closely related to unintended disclosure of information
Confidentiality
\_\_\_\_\_\_\_\_\_\_ and \_\_\_\_\_\_\_\_\_\_\_\_\_ are widely regarded as rights of all people which merits respect without need to be earned, argued, or defended
Privacy and confidentiality