Ethics, Privacy and Security Flashcards

1
Q

what are some issue in the use of appropriate informatics tools in clincal settings

A

determination of users
system evaluation
system development and maintenance
use of computer in tracking clinical outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

set of ethical principles for appropriate use of decision-support systems

A
  1. a program shld undergo appropriate evaluation prior to use in clinical practice. shld perform efficiently at an acceptable financial and timeframe cost
  2. adequate training ad instructions shld be completed b4 proceeding to implementation
  3. qualified health professionals shld be assigned to handle concerns regarding uses, licenses and other concerns. the software system’s application shld not replace functions such as decision making
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

it is defined as the idea of either allowing individuals to make their own decisions in response to a particular societal context or being free from external influence or control

A

autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the 2 principles of beneficence and non-maleficence

A

“do good”
“do no harm”

beneficence -use of stores data in EHR system
non-maleficence - with data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the health informatics ethics

A

general ethics:
autonomy
- cannot pilit to perform the procedure, they have their own decision and cant influence them

beneficence
non-maleficence

informatics ethics: LIPAASO
“principle of …”
least intrusive alternative
legitimate infringement
privacy
access
accountability
security
openness

software: SIP
society
institution and employees
profession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the ethical behavior expected from an individual assigned to handle information

A

informatics ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the ethical duties and responsibilities of software developers to the stakeholders

A

software ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

briefly explain the difference between privacy and confidentiality
(examples)

A

privacy: applies to indiv and their aversion to eavesdropping
confidentiality - unintended disclosure of information

( privacy - unwanted observation or intrusion [spying] and indiv can control their info
confidentiality - unauthorized sharing of info [break into] and recipient of info is responsible for protecting it )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

briefly explain the levels of security in hospital information system

A

administrative safeguards:
implemented by the management as organization -wide policies and procedures

physical safeguards:
mechanism to protect the equipment, system and location

technical safeguards:
automated proceesses to protect the software and database access and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

examples of levels of security in hospital information system

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the key functions that emphasizes that technological security tools are essential components of modern distributed health concern information system

A

the national research council (NRC) 1997
[CCAAP]
controlling access
- enable access to the performance of their jobs and limiting the real or perceived temptation to access info

comprehensibility and control
- ensure that record owners, data stewards and patients understand and hv effective control over appropriate aspects of inf privacy and access

availability
- accurate and up to date info

accountability
- responsible for their access to and use of info

perimeter identification
- knowing and controlling the boundaries, both physically and logically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

briefly explain the key steps in lab info flow for a hospital patient

A

register patient:
create patient record with basic info in LIS

order tests:
doctor requests tests, these orders are entered into the CIS and sent to LIS electronically

collect sample:
print labels
collect blood samples
scan barcodes

receive sample:
update sample status from “collected” to “received”
to see the turn around time din

run sample:
load the sample into the analyzer and perform requested tests

review results:
analyzers sends results to the system for technologist review

release results:
technologist approves results for release to the physician

report results:
physician views or prints results from the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

briefly explain the safeguards for the laboratory information system

A

administrative safeguards:
focuses n human factors like
- continuous employee training
- periodic review of standards
- strengthening authorization policies
- implementing strict test procedures
-enforcing proper workstation use

physical safeguards:
lab security like
-regular equipment maintainence
- biometric access controls
- temp regulation for equipment n species
- proper safety equipment usage

technical safeguards:
- deals with digital security of the LIS
- incorporate automated identity confirmation
- regular password changes
- automatic log off features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly