Ethics, Privacy, and Security Flashcards

1
Q

issues in the use of appropriate informatics tools in clinical settings, determination of users, system evaluation, system development and maintenance, and the use of computers in tracking clinical outcomes

A

Ethics in Health Informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 main aspects of health informatics

A

Healthcare, Informatics, Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

defined as the idea of either allowing
individuals to make their own decisions in response to a particular societal context, or being fee from external influence or control

A

Autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

do good and do no harm

A

Beneficial and Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the ethical behavior expected from an individual assigned to handle information (employees, research staff)

A

Informatics Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the ethical duties and responsibilities of software developers to the stakeholders (especially privacy and confidentiality)

A

Software Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

applies to individuals and their aversion to eavesdropping

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

more closely related to unintended disclosure of information

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

may be implemented by the management as organization-wide policies and procedures

A

Administrative Safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

mechanisms to protect equipment, systems, and locations

A

Physical Safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

automated processes to protect the software and database access and control

A

Technical Safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

emphasizes that technological security tools are essential components of modern distributed health care information systems, and that they serve five key functions (book):

A

National Research Council (NRC) (1997)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ensuring that accurate and up-to- date information is available when needed at appropriate places.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

helping to ensure that healthcare providers are responsible for their access to and use of information, based on a legitimate need and right to know;

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

knowing and controlling the boundaries of trusted access to the information system, both physically and logically.

A

Perimeter identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

enabling access for health care providers only to information essential to the performance of their jobs and limiting the real or perceived temptation to access information beyond a legitimate need.

A

Controlling access

17
Q

ensuring that record owners, data stewards, and patients understand and have effective control over appropriate aspects of information privacy and access.

A

Comprehensibility and control

18
Q

The patient record must be created in the LIS prior to the tests. The LIS usually receives these data automatically from the hospital registration system when a patient is admitted.

A

Register Patient

19
Q

Key Steps in Laboratory Flow for a Hospital Patient

A

Register Patient
Order Test
Collect Sample
Receive sample
Run sample
Review results
Release Results
Report Results

20
Q

5 Key Functions of Technological Security Tools

A

Availability, Accountability, Perimeter Identification, Controlling Access, Comprehensibility and control

21
Q

Knowing and controlling the boundaries of trusted access to the information system, both physically and logically

A

Perimeter Identification

22
Q

Enabling access for healthcare providers only to information essential to the performance of their jobs and limiting the real or perceived temptation to access information beyond a legitimate need

A

Controlling Access

23
Q

Once the sample arrives in the laboratory, the status is updated in the LIS from ____ to ____

A

“collected” to “received.”

24
Q

The___ prints a list of all patients who have to be drawn which also includes the appropriate number of sample barcode labels for each patient order.

A

LIS

25
Q

The ______ orders the tests for the patient and the procedure is requested as part of the laboratory’s morning blood collection rounds. These orders are entered into the CIS and they are sent to the LIS electronically.

A

attending physician

26
Q

The sample is loaded to the _____, and the barcode is then read.

A

analyzer

27
Q

The analyzer then produces the results and sends the same to the LIS. The results are only viewable to the ________ until it is released for general viewing.

A

assigned technologists

28
Q

The ______ is responsible for the release of the results.

A

technologist

29
Q

The ______ can now view the results on the CIS screen. Reports can be printed when needed.

A

physician

30
Q

the application of the principles of ethics to the domain of health informatics

A

Health information ethics

31
Q

Data Privacy Act of 2012

A

REPUBLIC ACT NO. 10173