0% found this document useful (0 votes)
100 views42 pages

Ethics, Privacy, AND Security

The document discusses ethics, privacy, and security as they relate to health informatics. It covers general ethics principles like autonomy, beneficence, and non-maleficence. It also discusses informatics ethics principles including information privacy, openness, security, access, and legitimate infringement. The document outlines levels of security for hospital information systems and laboratory information systems, including administrative, physical, and technical safeguards. Finally, it discusses the importance of privacy and confidentiality for protecting personal health information and encouraging people to seek medical care.

Uploaded by

RejaelSenoro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views42 pages

Ethics, Privacy, AND Security

The document discusses ethics, privacy, and security as they relate to health informatics. It covers general ethics principles like autonomy, beneficence, and non-maleficence. It also discusses informatics ethics principles including information privacy, openness, security, access, and legitimate infringement. The document outlines levels of security for hospital information systems and laboratory information systems, including administrative, physical, and technical safeguards. Finally, it discusses the importance of privacy and confidentiality for protecting personal health information and encouraging people to seek medical care.

Uploaded by

RejaelSenoro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

ETHICS,

PRIVACY,
AND
SECURITY
Content • Ethics in Health Informatics
– General Ethics
– Informatics Ethics
– Software Ethics
• Privacy, Confidentiality and 
Security
– Levels of Security in HIS
– Levels of Security in LIS
– Data Privacy Act
Health
informatics
ethics

• Application of the principles 
of ethics to the domain of 
health informatics
Ethics in Health Informatics
General Defined as either allowing 
individuals to make their
Ethics own decisions in response to
a particular societal context, 
or as the idea that no one human
person does not have the
authority nor should have
Autonomy power over another human
person
General • Electronic health records (EHR)
must maintain respect for patient
Ethics autonomy, and this entails certain 
restrictions about the access, 
content, and ownership of records

• Limiting patient access and control 
over patient records improves 
Autonomy document quality because they can 
become proofreaders of their own 
patient history (Mercuri, 2010).
General • Defined as “do good” and “do
Ethics no harm”, respectively.

• Beneficence relates most 
significantly with the use of the 
stored data in the EHR system
Beneficence
and Non- • Non-maleficence with data 
protection
maleficence
Principle of
Beneficence
in Health
Informatics
• Conduction of 
groundbreaking biomedical 
and public health research
Principle of
Non-
maleficence
in Health
Informatics
• Temporary Outage
• Total System Failure
• Data Security
Informatics • Principle of Information-Privacy
and Disposition
Ethics
– All have fundamental right to
privacy
– Thus the control over the 
collection, storage, access, use, 
communication, manipulation, 
linkage and disposition of data 
about themselves
Informatics • Principle of Openness
Ethics – The collection, storage, access, 
use, communication, 
manipulation, linkage and 
disposition of personal data must
be disclosed in an appropriate
and timely fashion to the
subject or subjects of those
data
Informatics • Principle of Security
Ethics – Data that have been legitimately 
collected about persons or groups of 
persons should be protected by
all reasonable and appropriate
measures against loss degradation, 
unauthorized destruction, access, 
use, manipulation, linkage, 
modification or communication.
Informatics • Principle of Access
Ethics – The subjects of electronic health 
records have the right of access to
those records and the right to
correct them with respect to its
accurateness, completeness and
relevance.
Informatics • Principle of Legitimate
Ethics Infringement
– The fundamental right of privacy and 
of control is conditioned only by the
legitimate, appropriate and
relevant data-needs of a free,
responsible and democratic society,
and by the equal and competing
rights of others
Informatics • Principle of the Least Intrusive
Alternative
Ethics
– Any infringement of the privacy 
rights of a person or group of 
persons, and of their right of control 
over data about them, may only 
occur in the least intrusive fashion 
and with a minimum of interference 
with the rights of the affected parties. 
Informatics • Principle of Accountability
Ethics – Any infringement of the privacy
rights of a person or group of 
persons, and of the right to control 
over data about them, must be
justified to the latter in good time
and in an appropriate fashion. 
Software Ethics
• The software developer has ethical duties and responsibilities to 
the following stakeholders:
– Society
• Best interest of the society. Developers should be mindful of social impacts of 
software systems.
• Includes disclosing any threats or known defects in software
– Institution and employees
• Best interests of the institution and its employees, while balancing their duties 
to the public, including being straightforward about personal limitations and 
qualifications
Software Ethics
• The software developer has ethical duties and responsibilities to 
the following stakeholders:
– Professional Standards
• Software products should meet expected professional standards.
• Developers should strive to build products that are of high standard, by 
thoroughly testing and detailing unresolved issues. 
Privacy, • Privacy generally applies to 
individuals and their aversion to 
Confidentiality
eavesdropping
and Security
• Confidentiality is more closely 
related to unintended 
disclosure of information
• Privacy and confidentiality are 
widely regarded as rights of all
people which merits respect
without need to be earned,
argued, or defended

• Protection of privacy and 
confidentiality is ultimately 
advantageous for both
individuals and society
Privacy, • Privacy and confidentiality 
protection also benefits public 
Confidentiality health.
and Security • When people are not afraid to 
disclose personal information, 
they are more inclined to seek 
out professional assistance, and 
it will diminish the risk of 
increasing untreated illnesses 
and spreading infectious 
diseases (Goodman, 2016).
Privacy, • When breaches of privacy and 
confidentiality occur  serious 
Confidentiality consequences for your 
organization, such as reputational 
and Security and financial harm, or harm to 
your patients
• Poor privacy and security 
practices heighten the 
vulnerability of patient 
information and increases the risk 
of successful cyber-attacks (USA 
Department of Health and Human 
Services, 2015). 
Privacy, • Obligations to protect privacy 
and to keep confidences fall on:
Confidentiality – System designers
and Security – Maintenance personnel
– Administrators
and, ultimately, to the:
• Physicians
• Nurses
• Other frontline users of the 
information
Levels of Security in the Hospital
Information System
Safeguards
• Continual risk assessment of your health IT environment
• Continual assessment of the effectiveness of safeguards for electronic 
health information
• Detailed processes for viewing and administering electronic health 
Administrative information
Safeguards • Employee training on the use of health IT to appropriately protect 
electronic health information
• Appropriately reporting security breaches (e.g., to those entities 
required by law or contract) and ensuring continued health IT 
operations
Levels of Security in the Hospital
Information System
Safeguards
• Office alarm systems
Physical • Locked offices containing computing equipment 
Safeguards that store electronic health information
• Security guards
Levels of Security in the Hospital
Information System
Safeguards
• Securely configured computing equipment (e.g., virus checking, 
firewalls)
•  Certified applications and technologies that store or exchange 
electronic health information
Technical • Access controls to health IT and electronic health information (e.g., 
Safeguards authorized computer accounts)
• Encryption of electronic health information
• Auditing of health IT operations
• Health IT backup capabilities (e.g., regular backups of electronic health 
information to another computer file server)
5 Key • Availability: ensuring that accurate and up-to-
date information is available when needed at 
Function appropriate places;
• Accountability: helping to ensure that health 
care providers are responsible for their access 
to and use of information, based on a 
legitimate need and right to know;
• Perimeter identification: knowing and 
controlling the boundaries of trusted access to 
the information system, both physically and 
logically;
5 Key • Controlling access: enabling access for 
Function health care providers only to information 
essential to the performance of their jobs 
and limiting the real or perceived 
temptation to access information beyond a 
legitimate need; and
• Comprehensibility and control: ensuring 
that record owners, data stewards, and 
patients understand and have effective 
control over appropriate aspects of 
information privacy and access.
Levels of Security in the
Laboratory Information System
STEP DESCRIPTION
Patient record (e.g. ID Number, name, sex, age, location) must be created in the LIS 
Register Patient before tests can be ordered. LIS usually automatically receives these data from a hospital 
registration system when a patient is admitted.
Physician orders tests on a patient to be draw as part of the laboratory’s morning blood 
Order Tests
collection rounds. The order is entered into the CIS and electronically sent to the LIS. 
Before morning blood collection, the LIS prints a list of all patients who have to be drawn 
and the appropriate number of sample bar-code labels for each patient order. Each 
barcode has a patient ID, sample contained, and laboratory workstation that can be used 
Collect Sample to sort the tube once it reaches the laboratory. Another increasingly popular approach is 
for patient caregivers or nurses to collect the blood sample. Immediately prior to 
collection, sample barcode labels can be printed (on demand) at the nursing station on an 
LIS printer or portable bedside printer.
Levels of Security in the
Laboratory Information System
STEP DESCRIPTION
When the samples arrive in the laboratory, their status has to be updated in the 
LIS from “collected” to “received.” This can be done by scanning each sample 
Receive Sample
container’s barcode ID into the LIS. Once the sample is “received,” the LIS 
transmits the test order to the analyser who will perform the test.
The sample is loaded onto the analyser, and the bar code is read. Having already 
received the test order from the LIS, the analyser knows which tests to perform 
on the patient. No work list is needed. For manually performed tests, the 
Run Sample
technologist prints a work list from the LIS. The work list contains the names of 
the patients and the tests ordered on each. Next to each test is a space to record 
the result.
Levels of Security in the
Laboratory Information System
STEP DESCRIPTION
The analyser produces the results and sends them to the LIS. These results are only 
viewable to technologists because they have not been released for general viewing. The 
Review Results
LIS can be programmed to flag certain results—for example, critical values—so the 
technologist can easily identify what needs to be repeated or further evaluated.
The technologist releases the results. Unflagged results are usually reviewed and released 
at the same time. The LIS can also be programmed to automatically review and release 
Release Results normal results or results that fall within a certain range. The latter approach reduces the 
number of tests that a technologist has to review. Upon release, the results are 
automatically transmitted to the CIS.
The physician can view the results on the CIS screen. Reports are printed when needed 
Report Results
from the LIS.
Safeguards for the Laboratory
Information System
Safeguards for the Laboratory Information System
• Continuous employee training on the use of the LIS
• Periodic review of standards in identifying which results should be flagged
• Strengthen laboratory authorization and supervision policies
Administrative
• Implement strict rules and regulations regarding the testing procedures
Safeguards • Release guidelines on proper disposal of laboratory specimen
• Enforce policies on the proper use of laboratory workstations
• Impose disciplinary measures as needed
• Periodic maintenance of laboratory equipment
• Biometrics or other security protocol for laboratory access
Physical Safeguards • Controlled temperature both for equipment and specimen
• Contingency operations plan
• Use of appropriate personal laboratory safety equipment 
Safeguards for the Laboratory
Information System
Safeguards for the Laboratory Information System
• Automated identity confirmation procedures for users requesting access
• Regular change of  username and password
Technical Safeguards • Different access capabilities based on user position
• Automatic log-off after long periods of inactivity
 
Data • Aim “to protect the 
fundamental human right of 
Privacy Act
privacy, of communication 
of 2012 while ensuring free flow of 
information to promote 
innovation and growth.” 
(Republic Act. No. 10173, Ch. 1, 
Sec. 2)
Data • Data Privacy Act applies to individuals and 
legal entities that are in the business of 
Privacy Act processing personal information.
• The law applies extraterritoriall
of 2012 • It covers personal information of Filipino 
citizens regardless of the place of residence.
• The main principles that govern the 
approach for the Data Privacy act include:
– Transparency;
– Legitimacy of purpose; and 
– Proportionality
Data • Consent is one of the major elements 
highly-valued by the Data Privacy Act.
Privacy Act
• The act provides that consent must
of 2012 be documented and given prior
to the collection of all forms of
personal data, and the collection
must be declared, specified, and for a
legitimate purpose.
Data • Furthermore, the subject must be 
notified about the purpose and
Privacy Act
extent of data processing, with 
of 2012 details specifying the need for 
automated processing, profiling, 
direct marketing, or sharing.
• These factors ensure that consent is 
freely-given, specific, and
informed.
Data • However, an exception to the 
requirement of consent is allowed in 
Privacy Act cases of contractual agreements
of 2012 where processing is essential to 
pursue the legitimate interests of 
the parties, except when overridden 
by fundamental rights and freedom.
• Such is also the case in responding 
to national emergencies.
Data • Data Privacy Act describes sensitive 
personal information as those being:
Privacy Act – About an individual’s race, ethnic origin, 
marital status, age, color, and religious, 
of 2012 philosophical or political affiliations;
– About an individual’s health, education, 
genetic or sexual life of a person, or to any 
proceeding or any offense committed or 
alleged to have committed;
– Issued by government agencies “peculiar” 
(unique) to an individual, such as social security 
number;
– Marked as classified by executive order or act 
of Congress.
Data • Consent of the data subject;
Privacy Act • Pursuant to law that does not require 
of 2012 consent;
• Necessity to protect life and health of a 
person;
• Necessity for medical treatment;
• Necessity to protect the lawful rights of 
Exceptions data subjects in court proceedings, 
legal proceedings, or regulation.
The act provides • Unauthorized processing
for different • Processing for unauthorized purposes
penalties for • Negligent access
varying • Improper disposal
violations, • Unauthorized access or intentional 
majority of which breach
include • Concealment of breach involving 
imprisonment. sensitive personal information
• Unauthorized disclosure; and 
These violations
• Malicious disclosure
include:
Penalty • Any combination or series of acts 
enumerated above shall make the 
person subject to imprisonment 
ranging from three (3) years to six 
(6) years, and a fine of not less 
than One million pesos 
(Php1,000,000.00) but not more 
than Five million pesos 
(Php5,000,000.00) (Republic Act. 
No. 10173, Ch. 8, Sec. 33).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy