UNIT 6 ETHICAL ISSUES RELATED TO TECHNOLOGY IN THE DELIVERY OF HEALTH CARE Flashcards

1
Q

is a law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.

A

Republic Act No. 10173, otherwise known as the Data Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to any freely given, specific, informed indication of will, whereby the data subject agrees to the collection and processing of personal information about and/or relating to him or her. Consent shall be evidenced by written, electronic or recorded means. It may also be given on behalf of the data subject by an agent specifically authorized by the data subject to do so.

A
  • Consent of the data subject
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to an individual whose personal information is processed.

A
  • Data subject
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to any information whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual.

A
  • Personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to a person or organization who controls the collection, holding, processing or use of personal information, including a person or organization who instructs another person or organization to collect, hold, process, use, transfer or disclose personal information on his or her behalf

A
  • Personal information controller
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The term excludes:
* (1) A person or organization who performs such functions as instructed by another person or organization; and
* (2) An individual who collects, holds, processes or uses personal information in connection with the individual’s personal, family or household affairs.

A
  • Personal information controller
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

refers to any natural or juridical person qualified to act as such under this Act to whom a personal information controller may outsource the processing of personal data pertaining to a data subject.

A
  • Personal information processor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

refers to any operation or any set of operations performed upon personal information including, but not limited to, the collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of data.

A
  • Processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

refers to any and all forms of data which under the Rules of Court and other pertinent laws constitute privileged communication.

A
  • Privileged information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • refers to personal information:
    (1) About an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical or political affiliations;
    (2) About an individual’s health, education, genetic or sexual life of a person, or to any proceeding for any offense committed or alleged to have been committed by such person, the disposal of such proceedings, or the sentence of any court in such proceedings;
    (3) Issued by government agencies peculiar to an individual which includes, but not limited to, social security numbers, previous or current health records, licenses or its denials, suspension or revocation, and tax returns; and
    (4) Specifically established by an executive order or an act of Congress to be kept classified.
A

Sensitive personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The unauthorized processing of personal information shall be penalized by imprisonment ranging

A

from one (1) year to three (3) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Two million pesos (Php2,000,000.00)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The unauthorized processing of personal sensitive information shall be penalized by imprisonment ranging from

A

three (3) years to six (6) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Four million pesos (Php4,000,000.00) shall be imposed on persons who process personal information without the consent of the data subject, or without being authorized under this Act or any existing law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accessing personal information due to negligence shall be penalized by imprisonment ranging from

A

one (1) year to three (3) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Two million pesos (Php2,000,000.00)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accessing sensitive personal information due to negligence shall be penalized by imprisonment ranging from

A

three (3) years to six (6) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Four million pesos (Php4,000,000.00) shall be imposed on persons who, due to negligence, provided access to personal information without being authorized under this Act or any existing law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The improper disposal of personal information shall be penalized by imprisonment ranging

A

from six (6) months to two (2) years and a fine of not less than One hundred thousand pesos (Php100,000.00) but not more than Five hundred thousand pesos (Php500,000.00

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The penalty of imprisonment of one (1) year and six (6) months to five (5) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00) shall be imposed on persons who, a

A

fter having knowledge of a security breach and of the obligation to notify the Commission pursuant to Section 20(f), intentionally or by omission conceals the fact of such security breach.

17
Q

BENEFITS AND CHALLENGES OF TECHNOLOGY

A
  1. Ease of Workflow
  2. Better and Safer Data Storage
  3. The Learning Curve
  4. The Cost
  5. Meaningful Use Compliance
  6. How Hospitals Can Keep Up
18
Q
  • Entering data into a computerizedsystem is much less time-consuming than paper-based methods, and it reduces the risk of errors in patient data and financial details. Accessing patient records digitally also allows medical coding experts to work from home, increasing efficiency and productivity.
A
  1. Ease of Workflow
19
Q
  • Cloud computer technology allows for masses of information to be stored at an unbelievably low cost, all without the limitations (and expense) of additional hardware or servers. With an increased reliance on EHR systems, Cloud storage protects against the loss of sensitive data with strong backup and recovery services.
  • Better treatment and less suffering
  • Improved patient care and worker efficiency
  • Doctors are easier to reach and better at their jobs
  • Challenges of Technology in Healthcare
A
  1. Better and Safer Data Storage
20
Q
  • Ongoing education is vital for medical professionals and healthcare administrators, but these professionals often juggle busy schedules and may not have the time to learn the latest technology. Not having a full understanding of new medical equipment may lead to errors, which is why it’s vital that medical facilities plan training for new processes or technology.
A
  1. The Learning Curve
21
Q
  • A 2012 report estimated that out of the trillions of dollars spent on healthcare every year, between 5 and 6 percent goes toward medical devices. At a glance, that may seem like practically nothing. For hospitals and clinics with limited resources, the cost can present a significant challenge. An article from a prominent school’s Technology Review states that many economists agree that healthcare has a troubled financial outlook largely because of the related costs.
A
  1. The Cost
22
Q

states that many economists agree that healthcare has a troubled financial outlook largely because of the related costs.

A

\Technology Review

23
Q
  • Centers for Medicare and Medicaid Services (CMS) Incentive Programs encourage healthcare facilities to make meaningful use of electronic health records, but this is difficult for many facilities to meet. Professionals who do not act in accord with meaningful use procedures will see a decrease in Medicare reimbursements, which could significantly increase financial concerns for clinics and hospitals that already have monetary woes.
A
  1. Meaningful Use Compliance
24
Q
  • The above listed challenges all boil down to the fact that keeping up with technological advances is difficult.
  • How can hospitals stay in line with technologies.
  • Technology is essential to healthcare, but it can also create difficulties. Administrators and leaders in the industry must work to overcome these challenges so all patients can benefit from the latest advances in medical technology.
A
  1. How Hospitals Can Keep Up
25
Q

Within the last 10 years, the creation of fast, low-cost genetic sequencing has given the public direct access to genome sequencing and analysis, with little or no guidance from physicians or genetic counselors on how to process the information.

A
  1. Personalized genetic tests/personalized medicine
26
Q

to create everything from architectural models to human organs, but we could be looking at a future in which we can print personalized pharmaceuticals or home-printed guns and explosives. For now, 3-D printing is largely the realm of artists and designers, but we can easily envision a future in which 3-D printers are affordable and patterns abound for products both benign and malicious, and that cut out the manufacturing sector completely.

A
  1. 3-D printing
27
Q

The differential susceptibility of people around the world to climate change warrants an ethical discussion. We need to identify effective and safe ways to help people deal with the effects of climate change, as well as learn to manage and manipulate wild species and nature in order to preserve biodiversity

A
  1. Adaptation to climate change
28
Q

Machines (both for peaceful purposes and for war fighting) are increasingly evolving from human-controlled, to automated, to autonomous, with the ability to act on their own without human input. As these systems operate without human control and are designed to function and make decisions on their own, the ethical, legal, social and policy implications have grown exponentially.

A
  1. Autonomous systems
29
Q

So far scientists have kept human-animal hybrids on the cellular level. According to some, even more modest experiments involving animal embryos and human stem cells violate human dignity and blur the line between species.

A
  1. Human-animal hybrids (chimeras)
30
Q

Mobile wireless connectivity is having a profound effect on society in both developed and developing countries. These technologies are completely transforming how we communicate, conduct business, learn, form relationships, navigate and entertain ourselves. At the same time, government agencies increasingly rely on the radio spectrum for their critical missions. This confluence of wireless technology developments and societal needs presents numerous challenges and opportunities for making the most effective use of the radio spectrum. We now need to have a policy conversation about how to make the most effective use of the precious radio spectrum, and to close the digital access divide for underserved (rural, low-income, developing areas) populations.

A
  1. Ensuring access to wireless and spectrum
31
Q

Pharmaceutical, surgical, mechanical and neurological enhancements are already available for therapeutic purposes. But these same enhancements can be used to magnify human biological function beyond the societal norm.

A
  1. Human enhancements
32
Q

The protection of private patient information is one of the most important ethical and legal issues in the field of healthcare. Conversations between a physician and a patient are strictly confidential, as is information about an individual’s medical condition.

A
  1. Patient Privacy and Confidentiality
33
Q

Sexual relationships between medical practitioners and patients or between medical staff are strictly forbidden at a healthcare facility. Sexual harassment can be harmful to all involved, including the facility, so the code of ethics should be explicit about this.

A
  1. Relationships
34
Q

Terminally ill patients may have specific wishes about the way they want their lives to end. Families may struggle with the decision to end life support for a loved one. Healthcare practitioners and clinical leaders need to be prepared to handle end-of-life issues as well as problems encountered in dealing with elderly patients who may not be able to make rational decisions on their own.

A
  1. End-of-Life Issues