Unit 7 - PRIVACY, CONFIDENTIALITY, SECURITY, AND ETHICS Flashcards
____ is the right to be left alone
privacy
____ the right to keep personal information secret
privacy
____ is defined as the freedom from intrusion or invasion into one’s private affairs
privacy
____ is known as the right to control personal information
privacy
____ refers to the status accorded to data/information indicating sensitivity, therefore it needs to be protected
protected against theft, disclosure, and improper use
Confidentiality
____ is a sharing or disseminating data only to those with a “need to know basis”
Confidentiality
____ refers to the means to control access and protect information from accidental or intentional disclosure to unauthorized persons
Security
Among privacy. confidentiality, and security, which of them refers to the mechanisms to ensure the safety of data and systems in which the data reside?
Security
RA 10173 is also known as?
Data Privacy Act of 2012
What law (or act) aims to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth?
Data Privacy Act of 2012
____ refers to a subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, or unauthorized disclosure of personal data
personal data breach
An information breach may only be classified as it is if it possesses what characteristics?
4 requirements of breach notif
- breached info must be sensitive (personal info)
- reasonable belief that unauthorized acquisition has occurred
- risk to data subj is real
- potential harm is siryuz
____ is defined by the Association of IT Professionals as the unauthorized use, access, modification, and destruction of hardware, software, data, or network resources
Computer crime
What are the key features of a secure system and network?
- Authentication
- Authorization and access control
- Data integrity
- Accountability
- Availability
- Data storage
- Data transmission
Identify the key feature of a secure system and network being described
Means of verifying the correct identity and/or group membership of individual or other entities
Authentication
What are the 4 methods or classifications for [identity] authentication?
- Username
- Known only by the user
- Held only by the user
- Attributable ony to the user
Identify the key feature of a secure system and network being described
- Feature that is dependent on the hierarchy of accession or permission of data.
- Data may be read, written, modified, and deleted
Authorization and Access Control
Identify the key feature of a secure system and network being described
- Used to support information accuracy to ensure that data have not been altered or destroyed in an unauthorized manner
- Error detection and error correction protocols
Data Integrity
Identify the key feature of a secure system and network being described
Ensures that the actions of any entity can be traced during the movement of data from its source to its recipient
Accountability
Audit trails must embody five characteristics. What are they?
- Identification of the user
- Data source
- Whose information
- Date and time
- Nature of the activity
Identify the key feature of a secure system and network being described
Ensures information is immediately accessible and usable by authorized entity
Availability
Identify the key feature of a secure system and network being described
- Protecting and maintaining the physical location of the data and the data itself
- Physical protection of processors, storage media, cables, terminals, and workstations
- Retention of data for mandated period of time
Data storage
Identify the key feature of a secure system and network being described
Exchange of data between person and program or program and program when the sender and receiver are remote from one another
Data Transmission
____ identifies what should enter and what should not. This includes data going in and out.
Filtering mechanism so that only authorized traffic is allowed to pass
Firewall
____ of data must scramble readable information and de-encrypt with proper key by ____.
Encryption; recipient
Identify the principle of technology ethics described
The good achieved by the techonology must outweight the harm or risk. Moreover, there must be no alternative that achieves the same or comparable with less harm or risk
Proportionality
Identify the principle of technology ethics described
The ppl affeted by technology shld understand and accept the risks
Informed consent
Identify the principle of technology ethics described
The benefits and burdens of the technology should be distributed fairly.
Justice
Identify the principle of technology ethics described
Technology implemented must be able to avoid all unnecessary possibility of loss or injury
Minimized risk
EHRs and computer use should facilitate patient care, support physician ethical duties, and support the ____ relationship
patient-doctor
True or False
Confidentiality is unintentional; security is intentional
True