HIS FINALS: MODULE 5 Flashcards
it covers issues on necessary actions and proper and improper
behaviors in the field of health care
health informatics
these are among the popular sources of debate.
privacy and confidentiality
A program should undergo appropriate evaluation before use in clinical practice. It should perform efficiently at an acceptable ——
finacial and timeframe cost
it should be completed before proceeding to the implementation.
adequate training and instruction
they should be assigned to handle concerns regarding uses, licenses, and other concerns.
qualified health professional
it should not replace functions such as decision making
software system applications
it is defined as the application of the principles and ethics in the domain of health informatics.
health information ethics
it Guides the reasoning and decision-making of all people and organizations involved in health care.
general ethics
it is defined as the idea of either allowing individuals to make their own decisions in response to a particular societal context or being free from external influence or control.
autonomy
it must respect patient autonomy
EHR
Includes certain restrictions about access, content, and ownership of records
EHR
it may defeat the purpose of the document because critical information may be modified or deleted without the knowledge of the health professional.
Too much pateint control
it improve document quality because patients also verify their records.
limited patient access and control
it is defined as do good
beneficence
it is defined to do no harm.
non-maleficence
it relates most significantly with the usage of stored data in the EHR syste in helath informatics
beneficence
it relates most significantly to how data is protected.
non-maleficence
it contain Data that can be utilized in groundbreaking biomedical and public health research.
deeply integrated EHR system
it should be developed with consent features for researchers and scientists
new EHR systems
it may provide the best possible treatment data for their patient, which is further upholds beneficence.
consolidated clinical data from repositories
it is also a breeding ground for varying threats like temporary outages or even total system failures resulting in the inability to performs necessary procedures or, at its worst, significant patient mortality
integrated data storgae in helath informatics
it contain sensitive information about an individual; it deserves the highest level of data security.
medical records
this put patients at risk and lead to a violation of non-maleficence
vulnerabilities
it is an ethical behavior expected from an individual assigned to handle information as prescribed by the International Medical Informatics Association
Informatics Ethics
principle of informatics ethics: Everyone has the fundamental right to privacy
Principle of Information-Privacy and Disposition
Principle of IE: Every individual should ensure that he or she has control over the collection, access, use, communication, manipulation, storage, linkage, and disposition of data about himself or herself.
Principle of Information - Privacy and Disposition
principle of IE: The control measures of particular data should be disclosed to the concerned individual in an appropriate and timely fashion.
Principle of Openness
Principle of IE: Legitimately collected data should be protected through all appropriate measures against access, use, modification or communication, manipulation, linkage, loss, degradation ad unauthorized destruction
Principle of Security
Principle of IE: Authorized individuals should be given access to electronic health records and the right to correct the data concerning completeness, accuracy, and relevance.
Principle of Access
Principle of IE: Authorized individuals should be given access to electronic health records and the right to correct the data concerning completeness, accuracy, and relevance.
Principle of Access
Principle of IE: The right to privacy and control over personal data should be conditioned by the appropriate, legitimate and relevant datarequirement of a democratic society and by the equal rights of others
Principle of Legitimate Infringement
Principle of IE: Any infringement of privacy rights should occur in the least intrusive manner and with the least amount of interference with the rights of the affected parties.
Principle of Least Intrusive Alternative
Principle of IE: Any infringement must be justified to the concerned individuals I a timely and appropriate fashion
Principle of Accountability
Ethical duties and responsibilities of software developers to the stakeholders (Society, institution and employees, and the profession).
Software Ethics
it relies on the use of the software to store and process information.
Health Information Ethics
It follows that the activities carried out by the developers might affect the end-users
Health information ethics
They should ensure that completed activities serve the best interest of the institution and its employees
Software Ethics
They should be straightforward about their limitations and qualifications
Software Ethics
They must build products that meet the professional standards through testing and detailing unresolved issues
Software Ethics
these are widely used in developed countries
EHR
EHR’s advantages:
1) Improve the quality of care
2) Reduce cost
3) Enhance patient mobility
4) Reliable
5) Enable evidence-based medicine
Who usually have concerns to teh transition from paper-ased to EHR
Low to Middle-Income Countries
Low to middle-income countries that the following concerns challenge to transition from paper-based to EHR systems:
1) Privacy and confidentiality
2) Security and Data integrity
3) Availability
it is a diagnostic report that includes the patient’s name, Social Security card number, and zip code
Protected Helath Information
There are —– data elements identified by the Health Insurance Portability and Accountability Act (HIPAA)
18
in healthcare settings, it refers to people’s right to control access to their personal information.
Privacy
Feature where People have the authority to determine what information to share, with whom, and how
Privacy
it protects the privacy of individually identifiable health information
HIPAA Privacy Rule
it does not apply to the use or disclosure of “de-identified health information,”
HIPAA Privacy Rule
it does not apply to the use or disclosure of “de-identified health information,”
HIPAA Privacy Rule
It implies that the data do not contain protected health information (PHI)
de-identified helath information
refers to the protection measures and tools that safeguard health information and health information systems from any unauthorized access to or modification of information, denial of service to authorized users, and provision of service to unauthorized users.
Security
it encompasses measures to safeguard data and computed programs from undesired occurrences and exposures
Data security
it covers safeguards associated with hardware, software, personnel, and enterprise-wide institutional policies
System Security
it is either a tool to protect privacy or an act limiting disclosure of private matters.
Confidentiality
The intent is to ensure that individual health information is used for the intended purpose only, and that patient consent is required for any disclosure.
confidentiality
The intent is to ensure that individual health information is used for the intended purpose only, and that patient consent is required for any disclosure.
confidentiality
it is Intertwined with privacy and security
confidentiality
it is foundational to the development and adoption of health informatics standards to prevent disclosure of PHI
Clear articulation of privacy, security and confidentiality
it is a sound framework with which to analyze an organization’s security management practices
National Institute of Standards and Technology (NIST) “Confidentiality, Integrity, and Availability Triad”
it is a requirement that information and rograms are changed only in a specified and authorized manner.
Integrity
It is a requirement that a system performs its intended function in an unimpared manner, free from deliberate or inadvertent unauthorized manupulation of teh system
System integrity
It is a requirement that private or confidential information not be disclosed to unauthorized individuals
Confidentiality
A requiremnet intended to ensure that systems work promptly and service is not denied to authorized users
Availability
A requiremnet intended to ensure that systems work promptly and service is not denied to authorized users
Availability
it is Implemented by management as organization-wide policies and procedures
Administrative
these are Mechanisms in place to protect equipment, systems, and locations
Physical
it is Automated processes protect software and database access and control
technical
it may be prescribed or restricted by law
safeguards