HIS FINALS: MODULE 5 Flashcards

1
Q

it covers issues on necessary actions and proper and improper
behaviors in the field of health care

A

health informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

these are among the popular sources of debate.

A

privacy and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A program should undergo appropriate evaluation before use in clinical practice. It should perform efficiently at an acceptable ——

A

finacial and timeframe cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

it should be completed before proceeding to the implementation.

A

adequate training and instruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

they should be assigned to handle concerns regarding uses, licenses, and other concerns.

A

qualified health professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

it should not replace functions such as decision making

A

software system applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

it is defined as the application of the principles and ethics in the domain of health informatics.

A

health information ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

it Guides the reasoning and decision-making of all people and organizations involved in health care.

A

general ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

it is defined as the idea of either allowing individuals to make their own decisions in response to a particular societal context or being free from external influence or control.

A

autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

it must respect patient autonomy

A

EHR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Includes certain restrictions about access, content, and ownership of records

A

EHR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

it may defeat the purpose of the document because critical information may be modified or deleted without the knowledge of the health professional.

A

Too much pateint control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

it improve document quality because patients also verify their records.

A

limited patient access and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

it is defined as do good

A

beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

it is defined to do no harm.

A

non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

it relates most significantly with the usage of stored data in the EHR syste in helath informatics

A

beneficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

it relates most significantly to how data is protected.

A

non-maleficence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

it contain Data that can be utilized in groundbreaking biomedical and public health research.

A

deeply integrated EHR system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

it should be developed with consent features for researchers and scientists

A

new EHR systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

it may provide the best possible treatment data for their patient, which is further upholds beneficence.

A

consolidated clinical data from repositories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

it is also a breeding ground for varying threats like temporary outages or even total system failures resulting in the inability to performs necessary procedures or, at its worst, significant patient mortality

A

integrated data storgae in helath informatics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

it contain sensitive information about an individual; it deserves the highest level of data security.

A

medical records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

this put patients at risk and lead to a violation of non-maleficence

A

vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

it is an ethical behavior expected from an individual assigned to handle information as prescribed by the International Medical Informatics Association

A

Informatics Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
principle of informatics ethics: Everyone has the fundamental right to privacy
Principle of Information-Privacy and Disposition
26
Principle of IE: Every individual should ensure that he or she has control over the collection, access, use, communication, manipulation, storage, linkage, and disposition of data about himself or herself.
Principle of Information - Privacy and Disposition
27
principle of IE: The control measures of particular data should be disclosed to the concerned individual in an appropriate and timely fashion.
Principle of Openness
28
Principle of IE: Legitimately collected data should be protected through all appropriate measures against access, use, modification or communication, manipulation, linkage, loss, degradation ad unauthorized destruction
Principle of Security
29
Principle of IE: Authorized individuals should be given access to electronic health records and the right to correct the data concerning completeness, accuracy, and relevance.
Principle of Access
30
Principle of IE: Authorized individuals should be given access to electronic health records and the right to correct the data concerning completeness, accuracy, and relevance.
Principle of Access
31
Principle of IE: The right to privacy and control over personal data should be conditioned by the appropriate, legitimate and relevant datarequirement of a democratic society and by the equal rights of others
Principle of Legitimate Infringement
32
Principle of IE: Any infringement of privacy rights should occur in the least intrusive manner and with the least amount of interference with the rights of the affected parties.
Principle of Least Intrusive Alternative
33
Principle of IE: Any infringement must be justified to the concerned individuals I a timely and appropriate fashion
Principle of Accountability
34
Ethical duties and responsibilities of software developers to the stakeholders (Society, institution and employees, and the profession).
Software Ethics
35
it relies on the use of the software to store and process information.
Health Information Ethics
36
It follows that the activities carried out by the developers might affect the end-users
Health information ethics
37
They should ensure that completed activities serve the best interest of the institution and its employees
Software Ethics
38
They should be straightforward about their limitations and qualifications
Software Ethics
39
They must build products that meet the professional standards through testing and detailing unresolved issues
Software Ethics
40
these are widely used in developed countries
EHR
41
EHR's advantages:
1) Improve the quality of care 2) Reduce cost 3) Enhance patient mobility 4) Reliable 5) Enable evidence-based medicine
42
Who usually have concerns to teh transition from paper-ased to EHR
Low to Middle-Income Countries
43
Low to middle-income countries that the following concerns challenge to transition from paper-based to EHR systems:
1) Privacy and confidentiality 2) Security and Data integrity 3) Availability
44
it is a diagnostic report that includes the patient’s name, Social Security card number, and zip code
Protected Helath Information
45
There are ----- data elements identified by the Health Insurance Portability and Accountability Act (HIPAA)
18
46
in healthcare settings, it refers to people’s right to control access to their personal information.
Privacy
47
Feature where People have the authority to determine what information to share, with whom, and how
Privacy
48
it protects the privacy of individually identifiable health information
HIPAA Privacy Rule
49
it does not apply to the use or disclosure of “de-identified health information,”
HIPAA Privacy Rule
50
it does not apply to the use or disclosure of “de-identified health information,”
HIPAA Privacy Rule
51
It implies that the data do not contain protected health information (PHI)
de-identified helath information
52
refers to the protection measures and tools that safeguard health information and health information systems from any unauthorized access to or modification of information, denial of service to authorized users, and provision of service to unauthorized users.
Security
53
it encompasses measures to safeguard data and computed programs from undesired occurrences and exposures
Data security
54
it covers safeguards associated with hardware, software, personnel, and enterprise-wide institutional policies
System Security
55
it is either a tool to protect privacy or an act limiting disclosure of private matters.
Confidentiality
56
The intent is to ensure that individual health information is used for the intended purpose only, and that patient consent is required for any disclosure.
confidentiality
57
The intent is to ensure that individual health information is used for the intended purpose only, and that patient consent is required for any disclosure.
confidentiality
58
it is Intertwined with privacy and security
confidentiality
59
it is foundational to the development and adoption of health informatics standards to prevent disclosure of PHI
Clear articulation of privacy, security and confidentiality
60
it is a sound framework with which to analyze an organization’s security management practices
National Institute of Standards and Technology (NIST) “Confidentiality, Integrity, and Availability Triad”
61
it is a requirement that information and rograms are changed only in a specified and authorized manner.
Integrity
62
It is a requirement that a system performs its intended function in an unimpared manner, free from deliberate or inadvertent unauthorized manupulation of teh system
System integrity
63
It is a requirement that private or confidential information not be disclosed to unauthorized individuals
Confidentiality
64
A requiremnet intended to ensure that systems work promptly and service is not denied to authorized users
Availability
65
A requiremnet intended to ensure that systems work promptly and service is not denied to authorized users
Availability
66
it is Implemented by management as organization-wide policies and procedures
Administrative
67
these are Mechanisms in place to protect equipment, systems, and locations
Physical
68
it is Automated processes protect software and database access and control
technical
69
it may be prescribed or restricted by law
safeguards