14 ethics, privacy, and security

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Health informatics ethics (HIE)

application of the principles of ethics to the domain of health informatics.

2
New cards

healthcare, informatics, and software

three main aspects of health informatics:

3
New cards

autonomy

is defined as either allowing individuals to make their own decisions in response to a particular societal context, or as the idea that no one human person does not have the authority nor should have power over another human person.

4
New cards

Beneficence and Non-maleficence

defined as "do good" and "do no harm." In health informatics, - relates most significantly with the use of the stored data in the BHIR system, and - with data protection.

5
New cards

Informatics ethics

involves the ethical behavior required of anyone handling data and information, as prescribed by the International Medical Informatics Association (2016).

6
New cards

seven principles

privacy, openness, security, access, legitimate infringement, least intrusive alternatives, and accountability.

7
New cards

Principle of Information-Privacy and Disposition

All persons and group of persons have a fundamental right to privacy, and hence to control over the collection, storage, access, use, communication, manipulation, linkage, and disposition of data about themselves.

8
New cards

Principle of Openness

The collection, storage, access, use, communication, manipulation, linkage, and disposition of personal data must be disclosed in an appropriate and timely fashion to the subject or subjects of those data.

9
New cards

Principle of Security

Data that have been legitimately collected about persons or groups of persons should be protected by all reasonable and appropriate measures against loss degradation, unauthorized destruction, access, use, manipulation, linkage, modification, or communication.

10
New cards

Principle of Access

The subjects of electronic health records have the right of access to those records and the right to correct them with respect to its accurateness, completeness, and relevance

11
New cards

Principle of Legitimate Infringement

The fundamental right of privacy and of control over the collection, storage, access, use, manipulation, linkage, communication, and disposition of personal data is conditioned only by the legitimate, appropriate, and relevant data-needs of a free, responsible, and democratic society, and by the equal and competing rights of others.

12
New cards

Principle of the Least Intrusive Alternative

Any infringement of the privacy rights of a person or group of persons, and of their right of control over data about them, may only occur in the least intrusive fashion and with a minimum of interference with the rights of the affected parties.

13
New cards

Principle of Accountability

Any infringement of the privacy rights of a person or group of persons, and of the right to control over data about them, must be justified to the latter in good time and in an appropriate fashion.

14
New cards

society

Activities should be carried out with the best interest of the - in mind. Developers should be mindful of social impacts of software systems. This includes disclosing any threats or known defects in software.

15
New cards

institutions and its employees

activities must be done in the best interests of the -, while balancing their duties to the public, including being straightforward about personal limitations and qualifications.

16
New cards

professional standards

software products should meet expected -.

17
New cards

Privacy

generally applies to individuals and their aversion to eavesdropping, whereas confidentiality is more closely related to unintended disclosure of information

18
New cards

confidentiality

if someone breaks into the clinic to view an individual's patient record, that perpetrator is in violation of -.

19
New cards

administrative, physical, technical

Safeguards can be on an - - - level

20
New cards

Administrative level

may be implemented by the management as organization-wide policies and procedures

21
New cards

Physical level

mechanisms to protect equipment, systems, and locations

22
New cards

Technical Level

automated processes to protect the software and database access and control

23
New cards

availability, accountability, perimeter identification, controlling access, comprehensability and control

technological security tools function

24
New cards

Availability

ensuring that accurate and up-to-date information is available when needed at appropriate places.

25
New cards

Accountability

helping to ensure that healthcare providers are responsible for their access to and use of information, based on a legitimate need and right to know;

26
New cards

Perimeter identification

knowing and controlling the boundaries of trusted access to the information system, both physically and logically.

27
New cards

Controlling access

enabling access for health care providers only to information essential to the performance of their jobs and limiting the real or perceived temptation to access information beyond a legitimate need.

28
New cards

Comprehensibility and control

ensuring that record owners, data stewards, and patients understand and have effective control over appropriate aspects of information privacy and access.

29
New cards

register patient, order tests, collect sample, receive sample, run sample, review results, release results, report results

Key Steps in Laboratory Information Flow for a Hospital Patient

30
New cards

Register Patient

Patient record (e.g., ID Number, name, sex, age, location) must be created in the LIS before tests can be ordered. LIS usually automatically receives these data from a hospital registration system when a patient is admitted.

31
New cards

Order Tests

Physician orders tests on a patient to be drawn as part of the laboratory's morning blood collection rounds. The order is entered into the CIS and electronically sent to the LIS.

32
New cards

Collect Sample

Before morning blood collection, the LIS prints a list of all patients whose blood samples have to be drawn and the appropriate number of sample bar-code labels for each patient's test order.

33
New cards

Receive Sample

When the samples arrive in the laboratory, their status have to be updated in the LIS from "collected" to "received." This can be done by scanning each sample container's barcode ID into the LIS.

34
New cards

Run Sample

The sample is loaded onto the analyzer, and the bar code is read. Having already received thes test order from the LIS, the analyzer knows which tests to perform on the patient.

35
New cards

Review results

The analyzer produces the results and sends them to the LIS. These results are only viewable to the technologists because they have not been released for general viewing.

36
New cards

Release Results

The technologist releases the results. Unflagged results are usually reviewed and released at the same time. The LIS can also be programmed to automatically review and release normal results or results that fall within a certain range.

37
New cards

Report Results

The physician can view the results on the CIS screen. Reports are printed when needed from the LIS.