Ethics Flashcards

1
Q
  • MORAL PRINCIPLES THAT GOVERN A PERSON’S BEHAVIOR
A

ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

COVERS ISSUES ON HONORABLE ACTIONS, AND PROPER AND IMPROPER BEHAVIORS IN THE FIELD OF HEALTH CARE

A

Ethics in Health Informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

APPLICATION OF THE PRINCIPLES OF ETHICS IN THE DOMAIN OF HEALTH INFORMATICS (I.E. GENERAL, INFORMATICS, SOFTWARE ETHICS)

A

HEALTH INFORMATION ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Main Aspects of Information Ethics

A

General Ethics
Informatics Ethics
Software Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In public health, _______ guide the reasoning and decision-making of all people and organization involved in health care.

A

general ethic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two ethical principles a professional must uphold:

A

Autonomy
Beneficence and Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

General Ethics:

"”do good and do no harm”

A

Beneficence and Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • usage of stored data in the EHR
A

Beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • how the stored data is protected
A

Non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

are undeniably a powerful tool to store raw data which can be useful in research to benefit patient + society

A

CDRs

Clinical Data Repositories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

General ethics is always under threat of________ causing damage

A

system failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Remedy for system failures in general ethics:

A

multiple backups (for fast and easy recovery)

highest level of data security tools (to deter vulnerabilities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Informatics Ethics
SEVEN (7) PRINCIPLES

A

Principle of Information-Privacy and Disposition

Principle of Openness

Principle of Security

Principle of Access

Principle of Legitimate Infringement

Principle of the Least Intrusive
Alternative

Principle of Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ensure individual has control over the collection, access, use, communication, manipulation, storage, linkage, and disposition

A

Principle of Information-Privacy and Disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disclosure to the individual in an appropriate and timely manner.

A

Principle of Openness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protection of data against unauthorized access, misuse, modification, manipulation, loss, or unauthorized destruction.

A

Principle of Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authorized individuals have the right to access and correct data.

A

Principle of Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Right to privacy and control over personal data should follow rules of democratic society and by equal rights of others.

A

Principle of Legitimate Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Any infringement of data should be done with the least amount of Interference minding the rights of the affected parties.

A

Principle of the Least Intrusive Alternative

20
Q

Any infringement must be justified to the concerned individuals in a timely and appropriate fashion

A

Principle of Accountability

21
Q

Defined as the ethical duties and responsibilities of software developers to the stakeholders (society, institution and employees, and the profession

A

Software Ethics

22
Q
  • STATE OR CONDITION OF BEING FREE FROM PUBLIC OBSERVATION
A

PRIVACY

23
Q
  • UNINTENDED DISCLOSURE OR PROTECTION OF INFORMATION
A

CONFIDENTIALITY

24
Q

should be upheld in confidence by authorized parties no matter what the circumstance

A

Health care information

25
Q

Protection of________ and _________ is non-negotiable because it is a duty that does not fluctuate

A

privacy and confidentiality

26
Q

_________ falls to anyone handling the information: system designers, maintenance personnel, administration, physicians, nurses, other hospital staff

A

Obligation

27
Q

are the solutions and tools which may be utilized to implement security policies at different levels of the organization

A

Safeguards

28
Q

Levels of security in HIS

A

Administrative level
Physical level
Technical level

29
Q
  • implemented by the management as organization-wide policies and procedures
A

Administrative level

30
Q
  • protect equipment, systems, and locations
A

Physical level

31
Q
  • protect software and database access and control
A

Technical level

32
Q

Levels of Security in HIS

Follow the________ principle

A

cost-benefit principle

33
Q

Five (5) Key Functions of Technological Security Tools From the

A

National Research Council (1997)

34
Q

Five (5) Key Functions of Technological Security Tools
From the National Research Council (1997):

A

Availability
Accountability
Perimeter Identification
Comprehensibility and Control
Controlling Access

35
Q

Levels of Security in LIS

A

Register Patient
Order Tests
Collect samples
Receive samples
Run samples
Review results
Release results
Report results

36
Q

Philippine Data Privacy Act of 2012

A

(RA 10173)

37
Q

(RA 10173)

A

Philippine Data Privacy Act of 2012

38
Q

RA 10173

SIGNED BY THEN-PHILIPPINE PRESIDENT,_________, ON_________

A

BENIGNO AQUINO III

AUGUST 15, 2012

39
Q

RA 10173 IS MODELED AFTER THE

A

EU DATA PROTECTION DIRECTIVE AND THE ASIA-PACIFIC ECONOMIC COOPERATION (APEC) PRIVACY FRAMEWORK

40
Q

Philippine total IT expenditure (2016):

A

$4.4 billion

41
Q

Filipino social media usage:

(Linkedln)

(Twitter) and

(Facebook)

A

3.5 million

13 million

42.1 million

42
Q

Aim of the Data Privacy Act:

A

“to protect the fundamental human right of privacy of communication while’ ensuring free flow of information to promote innovation and growth” (Ch. 1, Sec. 2)

43
Q

Target population:

A

individuals and legal entities in the business of processing personal information

44
Q

Law applies to all________, regardless of place of residence (extraterritorially)

A

Filipinos

45
Q

Main principles of Data Privacy Act

A

Transparency
Legitimacy of purpose
Proportionality

46
Q

One of the major elements of Data Privacy Act:

A

CONSENT