ETHICS, PRIVACY, AND SECURITY (LESSON 14; FINALS) Flashcards

1
Q

Encompasses issues of proper and improper behavior, honorable actions, and of right and wrong

A

HEALTHCARE INFORMATICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the application of the principles of ethics to the domain of health informatics

A

HEALTH INFORMATICS ETHICS (HIE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIE

A

HEALTH INFORMATICS ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three main aspects of health informatics

A

1) HEALTHCARE
2) INFORMATICS
3) SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

developed in order to assist in the dispensation of healthcare or other supplementary services

A

INFORMATION SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 scopes of Health Informatics Ethics

A

1) GENERAL
2) INFORMATICS
3) SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 principles of General Ethics

A

1) AUTONOMY
2) BENEFICENCE
3) NON-MALEFICENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

7 principles of Informatics Ethics

A

1) PRIVACY
2) OPENNESS
3) SECUTIRY
4) ACCESS
5) INFRINGEMENT
6) LEAST INTRUSION
7) ACCOUNTABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 principles of Software Ethics

A

1) SOCIETY
2) INSTITUTION AND EMPLOYEES
3) PROFESSION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

defined as either allowing individuals to make their own decisions in response to a particular societal context, or as the idea that no one human person does not have the authority nor should have power over another human person

A

AUTONOMY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

defined as “do good” and “do no harm”

A

BENEFICENCE AND NON-MALEFICENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

relates most significantly with the use of the stored data in the EHR system

A

BENEFICENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

relates with data protection

A

NON-MALEFICENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

involves the ethical behavior required of anyone handling data and information

A

INFORMATICS ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

all persons and group of persons have a fundamental right to privacy; control over the collection, storage, access, use, communication, manipulation, linkage, and disposition of data about themselves

A

PRINCIPLE OF INFORMATION-PRIVACY AND DISPOSITION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the collection, storage, access, use, communication, manipulation, linkage, and disposition of personal data must be disclosed in an appropriate and timely fashion to the subject or subjects of those data

A

PRINCIPLE OF OPENNESS

17
Q

data that have been legitimately collected that about persons or groups of persons should be protected by all reasonable and appropriate measures against loss degradation, unauthorized destruction, access, use, manipulation, linkage, modification, or communication

A

PRINCIPLE OF SECURITY

18
Q

the subjects of electronic health records have the right of access to those records and the right to correct them with respect to its accurateness, completeness, and relevance

A

PRINCIPLE OF ACCESS

19
Q

the fundamental right of privacy and of control over the collection, storage, access, use, manipulation, linkage, communication, and disposition of personal data is conditioned only by the legitimate, appropriate, and relevant data-needs of a free, responsible, and democratic society, and by the equal and competing rights of others

A

PRINCIPLE OF LEGITIMATE INFRINGMENT

20
Q

any infringement of the privacy rights of a person or group of persons, and of their right to control over data about them, may only occur in the least intrusive fashion and with a minimum of interference with the rights of the affected parties

A

PRINCIPLE OF THE LEAST INTRUSIVE ALTERNATIVE

21
Q

any infringement of the privacy rights of the person or group of persons, and of the right to control over data about them, must be justified to the latter in good time and appropriate fashion

A

PRINCIPLE OF ACCOUNTABILITY

22
Q

generally applies to individuals and their aversion to eavesdropping

A

PRIVACY

23
Q

unintended disclosure of information

A

CONFIDENTIALITY

24
Q

3 types of safeguards

A

1) ADMINISTRATIVE
2) PHYSICAL
3) TECHNICAL

25
Q

may be implemented by the management as organization-wide policies and procedures

A

ADMINISTRATIVE SAFEGUARDS

26
Q

mechanisms to protect equipment, systems, and locations

A

PHYSICAL SAFEGUARDS

27
Q

automated process to protect equipment, systems, and locations or control

A

TECHNICAL SAFEGUARDS

28
Q

5 key functions of technological security tools

A

1) AVAILABILITY
2) ACCOUNTABILITY
3) PERIMETER IDENTIFICATION
4) CONTROLLING ACCESS
5) COMPREHENSIBILITY AND CONTROL

29
Q

ensuring that accurate and up-to-date information is available when needed at appropriate places

A

AVAILABILITY

30
Q

helping to ensure that healthcare providers are responsible for their access to and use of information, based on legitimate need and right to know

A

ACCOUNTABILITY

31
Q

knowing and controlling the boundaries of trusted access to the information system, both physically and logically

A

PERIMETER IDENTIFICATION

32
Q

enabling access for health care providers only to information essential to the performance of their jobs and limiting the real or perceived temptation to access information beyond a legitimate need

A

CONTROLLING ACCESS

33
Q

ensuring that record owners, data stewards, and patients understand and have effective control over appropriate aspects of information privacy and access

A

COMPREHENSIBILITY AND CONTROL

34
Q

key steps in laboratory information flow for a hospital patient

A

1) REGISTER PATIENT
2) ORDER TESTS
3) COLLECT SAMPLE
4) RECEIVE SAMPLE
5) RUN SAMPLE
6) REVIEW RESULTS
7) RELEASE RESULTS
8) REPORT RESULTS