Ethics, Privacy, and Security Flashcards
issues in the use of appropriate informatics tools in clinical settings, determination of users, system evaluation, system development and maintenance, and the use of computers in tracking clinical outcomes
Ethics in Health Informatics
3 main aspects of health informatics
Healthcare, Informatics, Software
defined as the idea of either allowing
individuals to make their own decisions in response to a particular societal context, or being fee from external influence or control
Autonomy
do good and do no harm
Beneficial and Non-maleficence
the ethical behavior expected from an individual assigned to handle information (employees, research staff)
Informatics Ethics
the ethical duties and responsibilities of software developers to the stakeholders (especially privacy and confidentiality)
Software Ethics
applies to individuals and their aversion to eavesdropping
Privacy
more closely related to unintended disclosure of information
Confidentiality
may be implemented by the management as organization-wide policies and procedures
Administrative Safeguards
mechanisms to protect equipment, systems, and locations
Physical Safeguards
automated processes to protect the software and database access and control
Technical Safeguards
emphasizes that technological security tools are essential components of modern distributed health care information systems, and that they serve five key functions (book):
National Research Council (NRC) (1997)
ensuring that accurate and up-to- date information is available when needed at appropriate places.
Availability
helping to ensure that healthcare providers are responsible for their access to and use of information, based on a legitimate need and right to know;
Accountability
knowing and controlling the boundaries of trusted access to the information system, both physically and logically.
Perimeter identification
enabling access for health care providers only to information essential to the performance of their jobs and limiting the real or perceived temptation to access information beyond a legitimate need.
Controlling access
ensuring that record owners, data stewards, and patients understand and have effective control over appropriate aspects of information privacy and access.
Comprehensibility and control
The patient record must be created in the LIS prior to the tests. The LIS usually receives these data automatically from the hospital registration system when a patient is admitted.
Register Patient
Key Steps in Laboratory Flow for a Hospital Patient
Register Patient
Order Test
Collect Sample
Receive sample
Run sample
Review results
Release Results
Report Results
5 Key Functions of Technological Security Tools
Availability, Accountability, Perimeter Identification, Controlling Access, Comprehensibility and control
Knowing and controlling the boundaries of trusted access to the information system, both physically and logically
Perimeter Identification
Enabling access for healthcare providers only to information essential to the performance of their jobs and limiting the real or perceived temptation to access information beyond a legitimate need
Controlling Access
Once the sample arrives in the laboratory, the status is updated in the LIS from ____ to ____
“collected” to “received.”
The___ prints a list of all patients who have to be drawn which also includes the appropriate number of sample barcode labels for each patient order.
LIS
The ______ orders the tests for the patient and the procedure is requested as part of the laboratory’s morning blood collection rounds. These orders are entered into the CIS and they are sent to the LIS electronically.
attending physician
The sample is loaded to the _____, and the barcode is then read.
analyzer
The analyzer then produces the results and sends the same to the LIS. The results are only viewable to the ________ until it is released for general viewing.
assigned technologists
The ______ is responsible for the release of the results.
technologist
The ______ can now view the results on the CIS screen. Reports can be printed when needed.
physician
the application of the principles of ethics to the domain of health informatics
Health information ethics
Data Privacy Act of 2012
REPUBLIC ACT NO. 10173