Ethics , Privacy & Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

encompasses issues of proper and improper behaviour, honourable actions, and of right and wrong.

A

Healthcare informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

in medicine, nursing, human subject research, psychology, and other related fields continue to become more twisted and complex, but some overarching issues are common among them.

A

Ethical questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

on the other hand, are less familiar, even if some of them have been controversial for decades.

A

Ethical issues in health informatics,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

also raises questions about various legal and regulatory requirements.

A

Informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

should be used in clinical practice only after
appropriate evaluation of its efficacy and the documentation that it performs its intended task at an acceptable cost in time and money.

A

computer program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

should be preceded by adequate training and instruction, which should include review of applicable product evaluations.

A

informatics tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Users of most clinical systems should be

A

health professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is defined as either allowing individuals to make their own decisions in response to a particular societal context, or as the idea that no one human person does not have the authority nor should have power over another human person.

A

Autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

must maintain respect for patient autonomy,
and this entails certain restrictions about the access, content, and ownership of records.

A

Electronic health records (EHR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These two principles are respectively defined as “do good” and “do no harm.” In health informatics, beneficence relates most significantly with the use of the stored data in the EHR system, and non -maleficence with data protection.

A

Beneficence and Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

will contain substantial amounts of raw data, and
great potential exists for the conduction of groundbreaking biomedical and public health research. These kinds of research will be beneficial to both the individual patient, and to the entirety of society.

A

Deeply-integrated EHR systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

should be developed with the capacity to allow patients to release information from their EHRs which can be valuable to researchers and scientists.

A

new EHR systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

on the other hand, involves the ethical behaviour required of anyone handling data and information, as prescribed by the International Medical Informatics Association (2016). It covers seven principles: privacy, openness, security, access, legitimate infringement, least intrusive alternatives, and accountability.

A

Informatics Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

All persons and group of persons have a fundamental right to privacy, and hence to control over the collection, storage, access, use, communication, manipulation, linkage and disposition of data about themselves.

A

Principle of Information-Privacy and Disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The collection, storage, access, use, communication, manipulation, linkage and disposition of personal data must be disclosed in an appropriate and timely fashion to the subject or subjects of those data.

A

Principle of Openness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data that have been legitimately collected about persons or groups of persons should be protected by all reasonable and appropriate measures against loss degradation, unauthorized destruction, access,
use, manipulation, linkage, modification or communication.

A

Principle of Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The subjects of electronic health records have the right of access to those records and the right
to correct them with respect to its accurateness, completeness and relevance.

A

Principle of Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The fundamental right of privacy and of control over the collection, storage, access, use, manipulation, linkage, communication and disposition of personal data is conditioned only by the legitimate, appropriate and relevant data-needs of a free, responsible and democratic society, and by the equal and competing rights of others.

A

Principle of Legitimate Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Any infringement of the privacy rights of a person or group of persons, and of their right of control over data about them, may only occur in the least intrusive fashion and with a minimum of interference with the rights of the affected parties.

A

Principle of the Least Intrusive Alternative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Any infringement of the privacy rights of a person or group of persons, and of the right to control
over data about them, must be justified to the latter in good time and in an appropriate fashion.

A

Principle of Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

heavily relies on use of software to store and
process information. As a result, activities carried out by software developers might significantly affect end-users.

A

Software Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

has ethical duties and responsibilities to the following stakeholders: society, institution and employees, and the profession.

A

The software developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

generally applies to individuals and their aversion to eavesdropping, whereas confidentiality is more closely related to unintended disclosure of information.

A

Privacy

24
Q

also benefits public health. When people are not afraid to disclose personal information, they are more inclined to seek out professional assistance, and it will diminish the risk of increasing untreated illnesses and spreading infectious diseases (Goodman, 2016).

A

Privacy and confidentiality protection

25
Q
  • Employee training on the use of health IT to appropriately protect electronic health information
  • Continual risk assessment of your health IT environment
  • Continual assessment of the effectiveness of safeguards for electronic health information
  • Detailed processes for viewing and administering electronic health information
  • Appropriately reporting security breaches (e.g., to those entities required by law or contract) and ensuring continued health IT operations
A

Administrative Safeguards

26
Q
  • Locked offices containing computing equipment that store electronic health information
  • Office alarm system
  • Security guards
A

Physical Safeguards

27
Q
  • Encryption of electronic health information
  • Securely configured computing equipment (e.g.,virus checking, firewalls)
  • Certified application and technologies that store or exchange electronic health information
  • Access controls to health IT and electronic health information (e.g., authorized computer accounts)
  • Auditing of health IT operations
  • Health IT backup capabilities (e.g., regular backups of electronic information to another computer file server)
A

Technical Safeguards

28
Q

emphasizes that technological security tools are essential components of modern distributed health care information systems, and that they serve five key functions:

A

National Research Council (1997)

29
Q

ensuring that accurate and up-to-date information is available when needed at appropriate places;

A

Availability

30
Q

helping to ensure that health care providers are responsible for their access to and use of information, based on a legitimate need and right to know;

A

Accountability

31
Q

knowing and controlling the boundaries of trusted access to the information system, both physically and logically;

A

Perimeter identification

32
Q

enabling access for health care providers only to information essential to the performance of their jobs and limiting the real or perceived temptation to
access information beyond a legitimate need;

A

Controlling access

33
Q

ensuring that record owners, data stewards, and
patients understand and have effective control over appropriate aspects of information privacy and access.

A

Comprehensibility and control

34
Q
  • Patient record must be created in the LIS before test can be ordered. LIS usually automatically receives these data from a hospital registration system when a patient is admitted
A

Register Patient

35
Q
  • Physician orders tests on a patients to be draw as part of the laboratory’s morning blood collection rounds. The order is entered into the CIS and electronically sent to the LIS
A

Order Tests

36
Q

The LIS prints a list of all patients who have to be drawn and the appropriate number of sample bar-code labels for each patients order, Each barcode has a patient ID, sample contained, and laboratory workstation that can be used to sort the tubes one it reaches the laboratory

A

Collect Sample

37
Q
  • When the sample arrive in the laboratory, Their status has to e updated in the LIS from “collected” to “received”. this can be done by scanning each sample container’s barcode ID into the LIS. Once the sample id “received,” the LIS transmits test order to the analyser who will perform the test
A

Receive Sample

38
Q
  • The sample is loaded onto the the analyser, and the bar code is read. having already received the test order from the LIS, the analyser knows which test to perform of the patients. No work list is needed. For manually performed test, the technologist prints a work list from the LIS. The work list contains the names of the patients and the tests ordered on each. Next to each test is a space to record the result.
A

Run Sample

39
Q
  • The analyser produces the results and send the to the LIS. These results are only viewable to technologist because they have not been released for general viewing. the LIS can be programmed to flag certain results- for example, critical values - so the technologist can easily identify what needs to be repeated or further evaluated.
A

Review Results

40
Q
  • The technologist releases the results. Unflagged results are usually viewed and released at the same time. The LIS can also be programmed to automatically review and release normal results or results that fall within a certain range. The results are automatically transmitted to the CIS
A

Release Results

41
Q
  • The Physician can view the results on the CIS screen. Reports are printed when needed from the LIS.
A

Report Results

42
Q
  • Release guidelines on proper disposal of laboratory specimen
  • Continous employee training on the use of the LIS
  • Periodic review of standards in identifying which results should be flagged
  • strengthen laboratory authorization and supervision policies
  • Implement strict rules and regulation regarding the testing procedures
  • Enforcement policies on the proper use of laboratory workstations
  • Impose disciplinary measures as needed
A

Administrative Safeguards (LIS)

43
Q
  • Biometrics and other security protocol for laboratory access
  • periodic maintenance of laboratory equipment
  • Controlled temperature both for equipment and specimen
  • Contingency operations plan
  • Use of appropriate personal laboratory safety equipment
A

Physical Safeguards (LIS)

44
Q
  • Regular change of username and password
  • Automated identity confirmation procedures for users requesting access
  • Different acess capabilities based on user position
  • Automatic log-off after long periods of inactivity
A

Technical Safeguards (LIS)

45
Q

is an increasingly growing industry within the Philippine economy.

A

Business Process Management

46
Q

with an aim “to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.” (Republic Act. No. 10173, Ch. 1, Sec. 2).

A

Data Privacy Act of 2012

47
Q

applies to individuals and legal entities that are in the business of processing personal information.

A

The Data Privacy Act

48
Q

The main principles that govern the approach for the Data Privacy act include:

A
  1. Transparency;
  2. Legitimacy of purpose; and
  3. Proportionality.
49
Q

is one of the major elements highly-valued by the Data Privacy Act. The act provides that consent must be documented and given prior to the collection of all forms of personal data, and the collection must be declared, specified, and for a legitimate purpose.

A

Consent

50
Q

Processing of sensitive and personal information is also forbidden, except in particular circumstances enumerated below. The Data Privacy Act describes sensitive personal information as those being:

A

*About an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical or political affiliations;
*About an individual’s health, education, genetic or sexual life of a person, or to any proceeding or any
offense committed or alleged to have committed;
*Issued by government agencies “peculiar” (unique) to an individual, such as social security number;
*Marked as classified by executive order or act of Congress.

51
Q

The exceptions are:

A
  • Consent of the data subject;
  • Pursuant to law that does not require consent;
  • Necessity to protect life and health of a person;
  • Necessity for medical treatment;
  • Necessity to protect the lawful rights of data subjects in court proceedings, legal proceedings, or
    regulation.
  • The provisions of the law necessitate covered entities to create privacy and security program to improve the collection of data, limit processing to legitimate purposes, manage access, and implement data retention procedures.
52
Q

The act provides for different penalties for varying violations, majority of which include imprisonment.

A

Penalties

53
Q

These violations include:

A
  • Unauthorized processing
  • Processing for unauthorized purposes
  • Negligent access
  • Improper disposal
  • Unauthorized access or intentional breach
  • Concealment of breach involving sensitive personal information
  • Unauthorized disclosure; and
  • Malicious disclosure.
54
Q

Any combination or series of acts enumerated above shall make the person subject to imprisonment ranging from

A

three (3) years to six (6) years,

55
Q

Any combination or series of acts enumerated above shall make the person subject to a fine of not less than

A

One million pesos (Php1,000,000.00) but not more than Five million pesos (Php5,000,000.00) (Republic Act. No. 10173, Ch. 8, Sec. 33).