RES: Ethical, Legal and Security aspects of Health Informatics Flashcards

1
Q

what are the 2 ethical principles?

A
  1. Fundamental Ethical Principles
  2. General Principles of Informational Ethics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the 3 basic security principles?

A
  1. privacy & confidentiality
  2. availability
  3. integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the 2 legal standards?

A
  1. Health Insurance Portability and Accountability Act of 1996 (USA)
  2. R.A. Data Privacy Act of 2012 (Philippines)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the 6 FUNDAMENTAL principle of ethics

A
  1. autonomy
  2. equality and justice
  3. beneficence
  4. non maleficence
  5. impossibility
  6. integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

All persons have a fundamental right to self- determination

A

Principle of Autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All persons are equal and have a right to be treated accordingly

A

Principle of Equality and Justice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

All persons have a duty to advance the good of others where the nature of this good is in keeping with the fundamental and ethically defensible values of the affected party.

A

Principle of Beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All persons have a duty to prevent harm to other persons insofar as it lies within their power to do so without undue harm to themselves.

A

Principle of Non-Malfeasance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All rights and duties hold subject to the condition that it is possible to meet them under the circumstances that obtain

A

Principle of Impossibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whoever has an obligation has a corresponding duty to fulfill that obligation to the best of her or his ability

A

Principle of Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the 7 GENERAL principles of informational ethics?

A
  1. Principle of Information- Privacy and Disposition
  2. Principle of Openness
  3. Principle of Security
  4. Principle of Access
  5. Principle of Legitimate Infringement
  6. Principle of Least Intrusive Alternative
  7. Principle of Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Recognizes the fundamental right to privacy, person has control over processing of data about his/her data

A

Principle of Information- Privacy and Disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data processing must be disclosed in an appropriate and timely fashion to the subject or subjects of those data.

A

Principle of Openness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data that have been legitimately collected should be protected by all reasonable and appropriate measures to maintain integrity and confidentiality

A

Principle of Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The subject of a health record has the right of access to that records and the right to correct the record with respect to its accurateness, completeness, and relevance

A

Principle of Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data processes is conditioned only by the legitimate, appropriate, and relevant data- needs of a free, responsible and democratic society, and by the equal and competing rights of other persons

A

Principle of Legitimate Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Any infringement of the privacy rights of the individual person…may only occur in the least intrusive fashion and with a minimum of interference with the rights of the affected person

A

Principle of Least Intrusive Alternative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any infringement of the privacy rights of the individual person, and of the right to control over person-relative data, must be justified to the affected person in good time and in an appropriate fashion

A

Principle of Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the 3 security principles?

A
  1. privacy
  2. confidentiality
  3. security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Guarding against improper information modification or destruction, includes ensuring information non-repudiation and authenticity

A

INTEGRITY

18
Q

Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information

A

confidentiality

19
Q

Ensuring timely and reliable access to and use of information

A

availability

20
Q

what are the 3 protection measures?

A

management practices

physical safeguards

technical measures

21
Q

what are the elements of a security program

A
  1. protecting the privacy of data
  2. ensuring the integrity o fdata
  3. ensuring of availability pf data
22
Q

what are the threats caused by environmental and hardware or software factors

A
  1. Earthquakes, floods, hurricanes, tornadoes, etc.
  2. Hardware breakdown (e.g., hard disk crash causing data corruption
  3. Software failures (e.g., program code that doesn’t execute properly
  4. Electrical outrages or surges
  5. Malwares (e.g., viruses, worms, Trojan horse, Spyware, backdoor
    programs, Rootkit)
23
Q

what are the threats caused by people?

A
  1. Insiders who make innocent mistakes, abuse their privileges, access or alter data for spite or profit, Physical intruders who steal or otherwise harm systems and Vengeful employees or outsiders who mount attacks
24
Q

what are the 3 access controls

A

identification. authentication and authorization

25
Q

Act of verifying a claim of identity; types of authentication

A

authentication

26
Q

Right or permission given to an individual to use a computer resource, such as computer or to use specific applications and access specific data

A

authorization

27
Q

the 5 types of security??

A
  1. Passwords
  2. Smart Cards and Tokens (OTP)
  3. Biometrics
    4.Two-factor authentication
  4. Single sign-on
28
Q

HIPAA OF 1996

A
  • Ability to transfer and continue health insurance coverage for millions of American workers and their families when they change or lose jobs
29
Q

Ability to transfer and continue health insurance coverage for millions of American workers and their families when they change or lose jobs

A

HIPAA OF 1996

30
Q

Protected Health Information

A

HIPAA 1996

31
Q

HIPAA OF 1996 WAS ESTABLISHED IN THE….

A

USA

32
Q

R.A. 10173 “Data Privacy Act of 2012”

A
  • National Privacy Commission members were appointed in February 2016
  • Implementing Rules and Regulations of RA No. 10173 – published August 25, 2016
33
Q

This can help you in identifying the issues and determine the appropriate course of action.

A

ethical decision-making matrix

33
Q

This provides guidance and will need to be interpreted and applied in context and take into consideration the details of the situation to determine the appropriate course of action.

A

Ethical principles

34
Q

what are the 3 organizations under academic orgs?

A
  1. Institute of medicine
  2. UPM
  3. DLSHSI
35
Q

what are the 4 organizations under NON GOV orgs?

A
  1. International Medical Informatics Association: IMIA Code of Ethics for Health Professionals 2016
  2. Asia-Pacific Association of Medical Informatics
  3. Philippine Medical Informatics Society
  4. American Health Information Management Association
36
Q

what are the 2 organizations under GOV orgs?

A
  1. Department of Information and Communications Technology
  2. National Privacy Commission
37
Q

5 CONSUMERS/USERS of HEALTH INFORMATION TECHNOLOGY

A
  1. Patients
  2. healthcare professionals
  3. support staff
  4. health facilities
    5, third party payers/ insurance companies
38
Q

____ is the acronym for the Health Insurance Portability and Accountability Act that was passed by Congress in 1996 (in the United States of America).

A

HIPAA

39
Q

HIPAA does the following

A
  1. Provides the ability to transfer and continue health insurance coverage for millions of American workers and their families when they change or lose their jobs;
  2. Reduces health care fraud and abuse;
  3. Mandates industry-wide standards for health care information on electronic billing and other processes; and
  4. Requires the protection and confidential handling of protected health information
40
Q

what is the major goal of privacy rule

A

assure that individuals’ health information is properly protected while allowing the flow of health information needed to provide and promote high quality health care and to protect the public’s health and well- being.

41
Q

as well as all the Administrative Simplification rules, apply to health plans, health care clearinghouses, and to any health care provider who transmits health information in electronic form in connection with transactions for which the Secretary of HHS has adopted standards under HIPAA (the “covered entities”).

A

privacy rule

42
Q

what does the protected health information protect?

A

individually identifiable health information” held or transmitted by a covered entity or its  business associate, in any form or media, whether electronic,
paper, or oral.

43
Q

Why is there a data privacy law for the Philippines?

A

a law has been passed in the Philippines to serve as its local counterpart that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.

44
Q

an act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes.

A

RA 10173

45
Q

“the act of verifying a claim of identity”

A

Authentication

46
Q

There are 3 types of information that can be used for authentication

A
  1. Knowledge
  2. possession
  3. inherence
47
Q

A right or permission given to an individual to use a computer resource or to use specific applications and access specific data. It is also a set of actions that gives permission to an individual to perform specific functions such as view, write, edit, delete, or execute tasks. (Sayles, 2013)

A

authorization