Ethics, Privacy, and Security Flashcards

1
Q

Issues in the use of appropriate informatics tools in clinical settings, determination of users, system evaluation, system
development and maintenance, and the use of computers in tracking clinical outcomes.

A

Privacy and Confidentiality of the Patient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ethical Principles for Appropriate Use of Decision-Support Systems (Shortlife and Cimino, 2013):

A

o A program should undergo appropriate evaluation before use in clinical practice.
▪ Should perform efficiently at an acceptable financial and timeframe cost.

o Adequate training and instruction should be completed before proceeding to the implementation.

o A qualified health professional should be assigned to handle concerns about uses, licenses, and other concerns.
▪ The software systems’ applications should not replace functions such as decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the application of the principles of ethics in the domain of health informatics (healthcare and software informatics).

A

Health Information Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Guide the reasoning and decision-making of all people and organizations involved in healthcare.

A

GENERAL ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethical Principles:

A

Autonomy & Beneficence and Non-Maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the idea of either allowing individuals to make their own decisions in response to a particular societal context or being free from external influence or control.

A

Autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

do good and do no harm.

A

Beneficence and Non-Maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ethical behavior expected from an individual assigned to handle information.

A

Information Ethics

International Medical Informatics Association (2016)
(IMIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ethical duties and responsibilities of software developers to the stakeholders.

A

Software Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Seven Principles of Informatic Ethics

A
  1. Information-Privacy and Disposition
  2. Openness
  3. Security
  4. Access
  5. Legitimate Infringement
  6. Least Intrusive Alternative
  7. Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Applies to individual and their aversion to eavesdropping

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

More closely related to unintended disclosure of information

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

solutions and tools that may be utilized to implement security policies at different levels of health
organization.

A

Safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

– implemented by the management as organization-wide policies and procedures.

A

Administrative Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– mechanisms to protect equipment, systems, and locations with data.

A

Physical Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

automated processes to protect the software and database access and control.

A

Technical Level

17
Q
  • Regular risk assessment of the health information technology environment.
  • Continuous assessment of the effectiveness of safeguards for electronic health.
  • Detailed processes and procedures for viewing and administering electronic
    health information.
  • Reporting of security breaches and continued health information technology
    operations.
A

Administrative Safeguards

18
Q
  • Placing office alarm systems.
  • Locking offices and areas that contain computing equipment that stores electronic
    health information.
  • Having security guards that make regular inspections in the vicinity.
A

Physical Safeguards

19
Q
  • Configuration of computing equipment to ensure security.
  • Using certified applications and technologies that store or exchange electronic
    health information.
  • Setting up access controls to health information technology and electronic health
    information.
  • Encryption of electronic health information.
  • Regular audit of the health information technology operations.
  • Having backup capabilities.
A

Tecnhnical Safeguard

20
Q

emphasizes that technological security tools are essential components of modern distributed healthcare information systems.

A

National Research Council (1997)

21
Q

– accurate and up-to-date information is available when needed.

A

Availability

22
Q

– healthcare providers are responsible for their access to and use of information.

A

Accountability

23
Q

– know and control the boundaries of trusted access to the information system.

A

Perimeter Identification

24
Q

enable access to essential information and limit beyond legitimate need.

A

Controlling Access

25
Q

– record owners, data stewards, and patients understand and have effective control of information privacy and access.

A

Comprehensibility and Control

26
Q
A