ETHICS, PRIVACY, AND SECURITY Flashcards
Application of the principles
of ethics to the domain of
health informatics
Health informatics ethics
Defined as either allowing individuals to make their own decisions in response to a particular societal context, or as the idea that no one human person does not have the authority nor should have power over another human person
autonomy
Defined as “do good” and “do no harm”, respectively
Beneficence and Non-maleficence
Conduction of groundbreaking biomedical
and public health research
principle of beneficence in health informatics
- Temporary Outage
- Total System Failure
- Data Security
these are under what principle in health informatics?
principle of non-maleficence in health informatics
the control over the collection, storage, access, use, communication, manipulation,
linkage and disposition of data
about themselves
Principle of Information-Privacy
and Disposition
The collection, storage, access, use, communication, manipulation, linkage and disposition of personal data must be disclosed in an appropriate and timely fashion to the subject or subjects of those data
• Principle of Openness
Data that have been legitimately collected about persons or groups of persons should be protected by all reasonable and appropriate measures against loss degradation, unauthorized destruction, access, use, manipulation, linkage, modification or communication
Principle of Security
The subjects of electronic health records have the right of access to those records and the right to correct them with respect to its accurateness, completeness and relevance.
Principle of Access
The fundamental right of privacy and of control is conditioned only by the legitimate, appropriate and relevant data-needs of a free, responsible and democratic society, and by the equal and competing rights of others
Principle of Legitimate
Infringement
Any infringement of the privacy rights of a person or group of persons, and of their right of control over data about them, may only occur in the least intrusive fashion and with a minimum of interference with the rights of the affected parties.
Principle of the Least Intrusive
Alternative
Any infringement of the privacy rights of a person or group of persons, and of the right to control over data about them, must be justified to the latter in good time and in an appropriate fashion.
Principle of Accountability
__________ generally applies to
individuals and their aversion to eavesdropping
privacy
_____________ is more closely related to unintended disclosure of information
Confidentiality
\_\_\_\_\_\_\_\_\_\_ and \_\_\_\_\_\_\_\_\_\_\_\_\_ are widely regarded as rights of all people which merits respect without need to be earned, argued, or defended
Privacy and confidentiality
identify the key function:
ensuring that accurate and up-to-date information is available when needed at
appropriate places;
availability
identify the key function:
helping to ensure that health care providers are responsible for their access to and use of information, based on a legitimate need and right to know;
accountability
what key function:
knowing and controlling the boundaries of trusted access to the information system, both physically and logically;
Perimeter identification
what key function
enabling access for health care providers only to information essential to the performance of their jobs and limiting the real or perceived temptation to access information beyond a legitimate need; and
controlling access
ensuring that record owners, data stewards, and patients understand and have effective
control over appropriate aspects of
information privacy and access
comprehensibility and control
Aim “to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.” (Republic Act. No. 10173, Ch. 1, Sec. 2)
data privacy act of 2012