Lesson 14: Ethics, Privacy and Security Flashcards

1
Q

The application of the principles of ethics to the domain of health informatics.

A

Health Informatics Ethics (HIE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three main aspects of health informatics

A

Healthcare
Informatics
Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is developed in order to assist in the dispensation of healthcare or other supplementary services.

A

Information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It dwells in the efficiency of processing data

A

Health informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What covers the General/Healthcare principles

A

Autonomy
Beneficence and Non- maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What principles cover the informatics

A

Privacy
Openess
Security
Access
Infringement (Legitimate)
Least Intrusion
Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What principles cover the software?

A

Society
Institution and Employees
Profession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Allowing individuals to make their own decisions in response to a particular societal context

A

Autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The idea that no one human person does not have the authority nor should have the power over another human person

A

Autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It must maintain respect for patient autonomy.

A

Electronic Health Record (EHR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These two principles are respectively defined as “do good” and “do no harm”.

A

Beneficence and Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It involved the ethical behavior required of anyone handling data and information, as prescribed by the International Medical Informatics Association

A

Information ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The seven principles in information tics ethics

A

Principle of information - privacy and disposition
Principle of openness
Principle of security
Principle of access
Principle of legitimate infringement
Principle of the least intrusive alternative
Principle of accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It relies on use of software to store and process information

A

Health Informatics Ehtics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The software developer has ethical duties and responsibilities to the following stakeholders:

A

Society
Institution and Employees
Profession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

All persons and group of persons have a fundamental right to privacy, and hence to control over the collection, storage, access, use, communication, manipulation, linkage, and disposition of date about themselves.

A

Principle of Information - Privacy and Disposition

17
Q

The collection, storage, access, use, communication, manipulation, linkage and disposition of personal data must be disclosed in an appropriate and timely fashion to the subject or subjects of those data.

A

Principle of Openness

18
Q

Data have been legitimately collected about persons or groups of persons should be protected by all reasonable and appropriate measures against loss degradation, unauthorized destruction, access, use , manipulation, linkage, modification, or communication

A

Principle of Security

19
Q

The subjects of electronic health records have the right to access those records and the right to correct them with respect to its accurateness, completeness and relevance.

A

Principle of Access

20
Q

The fundamental right of privacy and of control over the collection, storage, access, use, manipulation, linkage, communication and disposition of personal date is conditioned only by the legitimate, appropriate, and relevant data-needs of a free, responsible, and democratic society, and by the equal and competing rights of others

A

Principle of Legitimate Infringement

21
Q

Any infringement of the privacy rights of a person or a group persons, and of their right to control over data about them, may only occur in the least intrusive fashion and with a minimum inference with the rights of the affected parties.

A

Principle of the Least Intrusive Alternative

22
Q

Any infringement of the privacy rights of a person or group of persons, and of the right to control over date about them, must be justified to the latter in good time and in an appropriate fashion.

A

Principle of Accountability

23
Q

It is used interchangeably, but they are not synonymous.

A

Privacy and Confidentiality

24
Q

Generally applies to individuals and their aversion to eavesdropping

A

Privacy

25
Q

It is more closely related to unintented disclosure of information.

A

Confidentiality

26
Q

It is widely regarded as rights of all people which merit respect without need to be earned, argued, or defended

A

Privacy and Confidentiality

27
Q

What are the levels of security in the hospital information system?

A

Administrative safeguards (organizational safeguards)

Physical safeguards

Technical safeguards

28
Q

May be implemented by the management as organization-wide policies and procedures

A

Administrative safeguards

29
Q

Mechanisms to protect equipment, systems, and locations

A

Physical

30
Q

Automated processes to protect the software and database access and control

A

Technical

31
Q

It emphasizes that technological security tools are essential components of modern distributed health care information systems.

A

National Research Council (NCR)

32
Q

What serves as five key functions in NRC?

A

Availability
Accountability
Perimeter identification
Controlling access
Comprehensibility and control

33
Q

Ensuring that accurate and up to date information is available when needed at appropriate places.

A

Availability

34
Q

Ensure that gealthcare providers are responsible for their access to and use of information, based on a legitimate need and right to know

A

Accountability

35
Q

Knowing and controlling the boundaries of trusted access to the information system, both physically and logically.

A

Perimeter identification

36
Q

Access for health care providers only to information essential to the performance of their jobs and limiting the real or perceived temptation to access information beyond legitimate need.

A

Controlling access

37
Q

Ensuring the record owners, data stewards, and patients understand and have effective control over appropriate aspects of information privacy and access

A

Comprehensibility and control

38
Q

What are the key steps in the Laboratory Information for a hospital patient?

A

Register patient
Order tests
Collect sample
Receive sample
Run sample
Review results
Release results
Report results