6. Ethics / Regulations / Governance Flashcards

1
Q

what is an example of health care record compromise, and what happened

A

MedStar Health targeted by Ransomware

  • delayed radiotherapy
  • cancelled appointments
  • prolonged drug usage past required dates
  • prolonged processing of lab results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is an example of health identity theft & the results

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

compare health identity theft with cc theft

A
  • credit card fraud is a common occurence e.g. a new tv charged to someone else
  • health identity theft example is undergoing surgery under someone else’s identity
  • the difference is the time to notice (e.g. if Medicare is paying the bill, the patient won’t notice)
  • costlier repercussions in hc
  • hc is harder to identify
  • cc is a single purchase, whereas hc can occur for a long time with no notice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the value of assuming health identities

A
  • uninsured people don’t need to pay as much for their treatment
  • bills are charged to another person
  • for countries without medicare, expensive drugs can be purchased for someone else
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is data governance

A

a framework used to create & enforce policies regarding data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

who are some people involved in data governance

A
  • governance council: high level decisions, policy creation
  • custodian: responsible for safety of data, implement business rules
  • steward: ensure fitness of data content & metadata & administer data policies and regulations
  • user: follow policy, inform others when policies are more difficult
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the benefits of data governance

A
  • data silos
  • safe access
  • monitoring
  • consistency
  • compliance e.g. HIPAA
  • data protection against threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are some other security threats

A
  • manmade (fire, power outages)
  • natural disasters
  • software dependencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is social engineering

A

tricking someone into revealing personal useful information including hacking one victim to assume identity and trick another victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is pretexting

A

using an invented scenario to persuade victims to release info / perform an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is phishing

A

luring unsuspecting interest with authentic looking emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is pharming

A

hijacking of an official website’s address to lure users into entering information in a different DNS server for the fraudulent site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the limitations of blockchain

A
  • can only add, not delete
  • mistakes are persisted (no reversal)
  • possible to de-anonymise
  • high energy consumption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is an ethical consideration of MHR

A

while we can do precision medicine, it’s compromise could have significant ramifications by revealing information about the entire population’s health conditions

but should we keep research closed off to this data when it can lead to improvements in clinical practice and personalisation of medicine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the 3 pillars of medical devices/tech

A
  • safety: expectation that users will be kept free from harm
  • effectiveness: performance under real-world circumstances
  • efficacy: performance under ideal & controlled circumstances
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is ethics for

A

informing the decisions, storage and practice around health information

16
Q

what are the ethical concerns about innovations in data capture

A
  • environment
  • more data captured
  • technology is more advanced e.g. camera can capture fingerprint if subject raises hand
17
Q

what are ethical categories

A
  • privacy: people have the right to control it
  • accuracy: people have the right to correct information
  • property: people have right of ownership
  • accessibility: people have the right to select who can access their information
18
Q

what is HREC

A
  • human research ethics committee
  • chair
  • knowledge of areas of research
  • current experience in prof. care
  • community/pastoral role
  • lawyer
18
Q

what is the minimum period to keep data in nsw health

A

7 years

19
Q

what else should be considered in ethical research

A
  • the study participants, are they being treated ethically
  • are specimens and records being treated ethically
  • security of data
20
Q

examples of studies that don’t require ethical approval

A
  • lab QA programs with no PII
  • anonymous & voluntary patient satisfaction surveys
  • statistical summaries of hospital activities
21
Q

what is the purpose of quality assurance audits & when do they require ethical concern

A
  • quality improvement
  • improvement of health care delivery

ethics required if:
- research involves direct approach to patients/staff
- consent required
- PII collected

22
Q

what is negligible risk

A

no foreseeable risk of harm or discomfort

23
Q

what are site-specific assessments

A
  • part of the research governance process
  • requires processes in place to ensure accountability, transparency, inclusiveness, equity & responsiveness
24
Q

what is an ethics code of conduct

A

collection of policies that is designed to guide decision making by members of the org. e.g.
- promote positive work env
- show honesty & integrity
- act professionally & ethically