ETHICS, PRIVACY, AND SECURITY Flashcards

1
Q

Application of the principles
of ethics to the domain of
health informatics

A

Health informatics ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Defined as either allowing individuals to make their own decisions in response to a particular societal context, or as the idea that no one human person does not have the authority nor should have power over another human person

A

autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defined as “do good” and “do no harm”, respectively

A

Beneficence and Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Conduction of groundbreaking biomedical

and public health research

A

principle of beneficence in health informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Temporary Outage
  • Total System Failure
  • Data Security

these are under what principle in health informatics?

A

principle of non-maleficence in health informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the control over the collection, storage, access, use, communication, manipulation,
linkage and disposition of data
about themselves

A

Principle of Information-Privacy

and Disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
The collection, storage, access,
use, communication,
manipulation, linkage and
disposition of personal data
must be disclosed in an
appropriate and timely fashion
to the subject or subjects of
those data
A

• Principle of Openness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Data that have been legitimately
collected about persons or groups of
persons should be protected by
all reasonable and appropriate
measures against loss degradation,
unauthorized destruction, access,
use, manipulation, linkage,
modification or communication
A

Principle of Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
The subjects of electronic health
records have the right of access to
those records and the right to
correct them with respect to its
accurateness, completeness and
relevance.
A

Principle of Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
The fundamental right of privacy and
of control is conditioned only by the
legitimate, appropriate and
relevant data-needs of a free,
responsible and democratic society,
and by the equal and competing
rights of others
A

Principle of Legitimate

Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Any infringement of the privacy
rights of a person or group of
persons, and of their right of control
over data about them, may only
occur in the least intrusive fashion
and with a minimum of interference
with the rights of the affected
parties.
A

Principle of the Least Intrusive

Alternative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Any infringement of the privacy
rights of a person or group of
persons, and of the right to control
over data about them, must be
justified to the latter in good time
and in an appropriate fashion.
A

Principle of Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ generally applies to

individuals and their aversion to eavesdropping

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____________ is more closely related to unintended disclosure of information

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
\_\_\_\_\_\_\_\_\_\_ and \_\_\_\_\_\_\_\_\_\_\_\_\_ are
widely regarded as rights of all
people which merits respect
without need to be earned,
argued, or defended
A

Privacy and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

identify the key function:

ensuring that accurate and up-to-date information is available when needed at
appropriate places;

A

availability

17
Q

identify the key function:

helping to ensure that health care providers are responsible for their access to and use of information, based on a legitimate need and right to know;

A

accountability

18
Q

what key function:

knowing and controlling the boundaries of trusted access to the information system, both physically and logically;

A

Perimeter identification

19
Q

what key function

enabling access for health care providers only to information essential to the performance of their jobs and limiting the real or perceived temptation to access information beyond a legitimate need; and

A

controlling access

20
Q

ensuring that record owners, data stewards, and patients understand and have effective
control over appropriate aspects of
information privacy and access

A

comprehensibility and control

21
Q

Aim “to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.” (Republic Act. No. 10173, Ch. 1, Sec. 2)

A

data privacy act of 2012