Lesson 14: Ethics, Privacy, and Security Flashcards

(45 cards)

1
Q

users of most clinical systems must be

A

health professionals


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

application of principles of ethics to the domain of health informatics

A

Health Information ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

three aspects of informatics

A

Healthcare, informatics, software


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

are developed in order to assist in the dispensation of health care of processing data

A

Information system


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

stored for future use, to be retrieved when needed

A

Voluminous patient information


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

must maintain respect for for patient autonomy, and quality of patient records

A

Electronic health record


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

use of stored data in the EHR

A

Beneficence


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______ and _______ improves document quality

A

Limiting patient access ; control over patient record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

use of stored data in the EHR

A

Beneficence


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data protection

A

non-maleficence


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

involves ethical behavior required to anyone handling data and information, prescribed by International Medical Informatics Association

A

information ethics


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

all person or groups have a fundamental right to privacy, hence control over the collection of storage, access, use, communication

A

Principle of information-privacy and disposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the collection of storage, use, access, communication, manipulation, linkage, and disposition of personal data must be disclosed in an appropriate and timely fashion to the subject

A

principles to openness


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

legitimately collected about persons or groups of persons should be protected by all reasonable and appropriate measures against loss degradation, unauthorized destruction, access, use, manipulation, linkage, modification, or communication

A

principle to security


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EHR have the right of access to those records and the right to correct them with respect to its accurateness, completeness, and relevance

A

principle of access


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

fundamental right of privacy and of control over the collection, storage, access, use, manipulation, linkage, communication of personal data

A

principles of legitimate infringement


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

any infringement of the privacy rights of a person and of their right of control over data about them, may only occur in the least intrusive fashion with a minimum of interference with the rights of the affected parties

A

Principle of the least intrusive alternative


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

any infringement of any rights to control over data about them, must be justified to the latter in good time and in an appropriate fashion

A

principle of accountability


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ethical duties and responsibilities to the following stakeholders

A

software developer


20
Q

developers should be mindful of social impacts of software system

21
Q

while balancing their duties to the public, including being straightforward about personal limitations and qualification

A

institutions and its employees


22
Q

applies to individuals and their aversion to eavesdropping, whereas confidentiality is more closely related to unintended disclosure of information.

23
Q

someone breaks into the clinic to view an individual’s patient record, that perpetrator is in violation

A

confidentiality


24
Q

essential in establishing a successful physician-patient or nurse-patient relationship

25
implemented by the management as organization-wide policies and procedures
administrative

26
mechanisms to protect equipment's, systems, locations
physical

27
processes to protect software and database access and control
technical

28
if it is not cost effective for your practice to avail of an expensive technology to mitigate a risk to electronic health record
cost-benefit principle
29
continual risk assessment of your health IT environment continual assessment of the effectiveness of safeguards for electronic health information Employee training on the use of health IT to appropriately protect electronic health information appropriately reporting security breaches and ensuring continued health IT operation
Administrative safeguards
30
office alarm system locked offices containing computing equipment that store electronic health information security guards
Physical safeguard
31
securely configured computing equipment certified applications and technologies that store or exchange electronic health information access controls to health IT and electronic health information encryption of electronic health information auditing of health IT operation
Technical safeguard
32
emphasizes that technological security tools are essential component of modern distributed health care information system
National research council (1997)
33
ensuring that accurate and up-to-date information is available when needed at appropriate places
availability

34
helping to ensure that healthcare providers are responsible for their access to and use of information
accountability

35
knowing and controlling the boundaries of trusted access to the information system, both physically and logically
Perimeter identification

36
enabling access for health care providers only to information essential to the performance of their jobs
controlling access

37
ensuring that record owners, data stewards, and patient understand and have effective control over
comprehensibility and control
38
patient record must be created in the LIS before tests can be ordered
register patient

39
patient to be drawn as part of the laboratory's morning blood collection rounds
order test

40
nurse to collect samples
collect sample

41
samples arrive in the laboratory
receive sample

42
sample is loaded in a analyzer and bar code is read
run sample
43
analyzer produces the results and sends them to LIS
review results
44
technologist release the result
release results

45
physician can view the results on CIS screen
report result