Ethics, Privacy and Security Flashcards
what are some issue in the use of appropriate informatics tools in clincal settings
determination of users
system evaluation
system development and maintenance
use of computer in tracking clinical outcomes
set of ethical principles for appropriate use of decision-support systems
- a program shld undergo appropriate evaluation prior to use in clinical practice. shld perform efficiently at an acceptable financial and timeframe cost
- adequate training ad instructions shld be completed b4 proceeding to implementation
- qualified health professionals shld be assigned to handle concerns regarding uses, licenses and other concerns. the software system’s application shld not replace functions such as decision making
it is defined as the idea of either allowing individuals to make their own decisions in response to a particular societal context or being free from external influence or control
autonomy
what are the 2 principles of beneficence and non-maleficence
“do good”
“do no harm”
beneficence -use of stores data in EHR system
non-maleficence - with data protection
what are the health informatics ethics
general ethics:
autonomy
- cannot pilit to perform the procedure, they have their own decision and cant influence them
beneficence
non-maleficence
informatics ethics: LIPAASO
“principle of …”
least intrusive alternative
legitimate infringement
privacy
access
accountability
security
openness
software: SIP
society
institution and employees
profession
the ethical behavior expected from an individual assigned to handle information
informatics ethics
the ethical duties and responsibilities of software developers to the stakeholders
software ethics
briefly explain the difference between privacy and confidentiality
(examples)
privacy: applies to indiv and their aversion to eavesdropping
confidentiality - unintended disclosure of information
( privacy - unwanted observation or intrusion [spying] and indiv can control their info
confidentiality - unauthorized sharing of info [break into] and recipient of info is responsible for protecting it )
briefly explain the levels of security in hospital information system
administrative safeguards:
implemented by the management as organization -wide policies and procedures
physical safeguards:
mechanism to protect the equipment, system and location
technical safeguards:
automated proceesses to protect the software and database access and control
examples of levels of security in hospital information system
what are the key functions that emphasizes that technological security tools are essential components of modern distributed health concern information system
the national research council (NRC) 1997
[CCAAP]
controlling access
- enable access to the performance of their jobs and limiting the real or perceived temptation to access info
comprehensibility and control
- ensure that record owners, data stewards and patients understand and hv effective control over appropriate aspects of inf privacy and access
availability
- accurate and up to date info
accountability
- responsible for their access to and use of info
perimeter identification
- knowing and controlling the boundaries, both physically and logically
briefly explain the key steps in lab info flow for a hospital patient
register patient:
create patient record with basic info in LIS
order tests:
doctor requests tests, these orders are entered into the CIS and sent to LIS electronically
collect sample:
print labels
collect blood samples
scan barcodes
receive sample:
update sample status from “collected” to “received”
to see the turn around time din
run sample:
load the sample into the analyzer and perform requested tests
review results:
analyzers sends results to the system for technologist review
release results:
technologist approves results for release to the physician
report results:
physician views or prints results from the system
briefly explain the safeguards for the laboratory information system
administrative safeguards:
focuses n human factors like
- continuous employee training
- periodic review of standards
- strengthening authorization policies
- implementing strict test procedures
-enforcing proper workstation use
physical safeguards:
lab security like
-regular equipment maintainence
- biometric access controls
- temp regulation for equipment n species
- proper safety equipment usage
technical safeguards:
- deals with digital security of the LIS
- incorporate automated identity confirmation
- regular password changes
- automatic log off features