Lesson 14: Ethics, Privacy, and Security Flashcards

1
Q

users of most clinical systems must be

A

health professionals


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

application of principles of ethics to the domain of health informatics

A

Health Information ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

three aspects of informatics

A

Healthcare, informatics, software


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

are developed in order to assist in the dispensation of health care of processing data

A

Information system


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

stored for future use, to be retrieved when needed

A

Voluminous patient information


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

must maintain respect for for patient autonomy, and quality of patient records

A

Electronic health record


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

use of stored data in the EHR

A

Beneficence


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______ and _______ improves document quality

A

Limiting patient access ; control over patient record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

use of stored data in the EHR

A

Beneficence


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data protection

A

non-maleficence


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

involves ethical behavior required to anyone handling data and information, prescribed by International Medical Informatics Association

A

information ethics


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

all person or groups have a fundamental right to privacy, hence control over the collection of storage, access, use, communication

A

Principle of information-privacy and disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the collection of storage, use, access, communication, manipulation, linkage, and disposition of personal data must be disclosed in an appropriate and timely fashion to the subject

A

principles to openness


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

legitimately collected about persons or groups of persons should be protected by all reasonable and appropriate measures against loss degradation, unauthorized destruction, access, use, manipulation, linkage, modification, or communication

A

principle to security


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EHR have the right of access to those records and the right to correct them with respect to its accurateness, completeness, and relevance

A

principle of access


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

fundamental right of privacy and of control over the collection, storage, access, use, manipulation, linkage, communication of personal data

A

principles of legitimate infringement


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

any infringement of the privacy rights of a person and of their right of control over data about them, may only occur in the least intrusive fashion with a minimum of interference with the rights of the affected parties

A

Principle of the least intrusive alternative


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

any infringement of any rights to control over data about them, must be justified to the latter in good time and in an appropriate fashion

A

principle of accountability


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ethical duties and responsibilities to the following stakeholders

A

software developer


20
Q

developers should be mindful of social impacts of software system

A

society


21
Q

while balancing their duties to the public, including being straightforward about personal limitations and qualification

A

institutions and its employees


22
Q

applies to individuals and their aversion to eavesdropping, whereas confidentiality is more closely related to unintended disclosure of information.

A

Privacy


23
Q

someone breaks into the clinic to view an individual’s patient record, that perpetrator is in violation

A

confidentiality


24
Q

essential in establishing a successful physician-patient or nurse-patient relationship

A

trust


25
Q

implemented by the management as organization-wide policies and procedures

A

administrative


26
Q

mechanisms to protect equipment’s, systems, locations

A

physical


27
Q

processes to protect software and database access and control

A

technical


28
Q

if it is not cost effective for your practice to avail of an expensive technology to mitigate a risk to electronic health record

A

cost-benefit principle

29
Q

continual risk assessment of your health IT environment

continual assessment of the effectiveness of safeguards for electronic health information

Employee training on the use of health IT to appropriately protect electronic health information

appropriately reporting security breaches and ensuring continued health IT operation

A

Administrative safeguards

30
Q

office alarm system

locked offices containing computing equipment that store electronic health information

security guards

A

Physical safeguard

31
Q

securely configured computing equipment

certified applications and technologies that store or exchange electronic health information

access controls to health IT and electronic health information

encryption of electronic health information

auditing of health IT operation

A

Technical safeguard

32
Q

emphasizes that technological security tools are essential component of modern distributed health care information system

A

National research council (1997)

33
Q

ensuring that accurate and up-to-date information is available when needed at appropriate places

A

availability


34
Q

helping to ensure that healthcare providers are responsible for their access to and use of information

A

accountability


35
Q

knowing and controlling the boundaries of trusted access to the information system, both physically and logically

A

Perimeter identification


36
Q

enabling access for health care providers only to information essential to the performance of their jobs

A

controlling access


37
Q

ensuring that record owners, data stewards, and patient understand and have effective control over

A

comprehensibility and control

38
Q

patient record must be created in the LIS before tests can be ordered

A

register patient


39
Q

patient to be drawn as part of the laboratory’s morning blood collection rounds

A

order test


40
Q

nurse to collect samples

A

collect sample


41
Q

samples arrive in the laboratory

A

receive sample


42
Q

sample is loaded in a analyzer and bar code is read

A

run sample

43
Q

analyzer produces the results and sends them to LIS

A

review results

44
Q

technologist release the result

A

release results


45
Q

physician can view the results on CIS screen

A

report result