0% found this document useful (0 votes)
105 views20 pages

Ethics, Privacy, Security

This document discusses ethics, privacy and security in health informatics. It explains the importance of ethics in health informatics and reviews key privacy and security measures in hospitals. Specifically, it outlines the principles of ethics in health informatics, including autonomy, beneficence, and non-maleficence. It also discusses privacy, confidentiality, and the seven principles of information ethics. Finally, it reviews security measures and levels in hospital information systems, as well as relevant privacy laws like the Philippine Data Privacy Act of 2012.

Uploaded by

qwerty master
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views20 pages

Ethics, Privacy, Security

This document discusses ethics, privacy and security in health informatics. It explains the importance of ethics in health informatics and reviews key privacy and security measures in hospitals. Specifically, it outlines the principles of ethics in health informatics, including autonomy, beneficence, and non-maleficence. It also discusses privacy, confidentiality, and the seven principles of information ethics. Finally, it reviews security measures and levels in hospital information systems, as well as relevant privacy laws like the Philippine Data Privacy Act of 2012.

Uploaded by

qwerty master
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

ETHICS, PRIVACY

AND SECURITY
TOPIC 14
INTENDED
LEARNING
OUTCOMES: • Explain the ethics in health
informatics; and
• Review the privacy, confidentiality,
and security measures in hospitals
HEALTH INFORMATICS
• Health informatics is the science of how to use data, information
and knowledge to improve human health and the delivery of
health care services.

ETHICS IN HEALTH INFORMATICS


• Health care informatics covers issues on honorable actions and
proper and improper behaviors in the field of health care.
• Privacy and confidentiality, use of appropriate informatics tools in
clinical settings, determination of users, and system development.
ETHICS IN HEALTH INFORMATICS

ETHICAL PRINCIPLES
• A program should undergo appropriate evaluation prior to use in
clinical practice. It should perform efficiently at an acceptable financial
and timeframe cost.
• Adequate training and instruction should be completed before
proceeding to the implementation.
• A qualified health professional should be assigned to handle concerns
regarding uses, licenses, and other concerns. The software system’s
applications should not replace functions as decision-making.
HEALTH INFORMATION ETHICS
• Health informatics is guided by health information ethics defined as the
application of the principles of ethics in the domain of health informatics.
• The 3 main aspects of information ethics are:
1. General Ethics
2. Informatics Ethics, and
3. Software ethics.
GENERAL ETHICS
• General ethics guide the reasoning and decision-making of all people and organization
involved in health care.
Two ethical principle a health professional must uphold:
1. Autonomy
2. Beneficence and Non-maleficence
AUTONOMY
-Defines as the idea of either allowing individuals to make their own decisions in
response to a particular societal context, or being free from external influence
or control.
- EHR must maintain respect for patient autonomy and this entails certain
restrictions about the access, content and ownership of records.

BENEFICENCE AND NON-MALEFICENCE


-These 2 principles are respectively defined as do good and do no harm.
- In health informatics, beneficence relates most significantly with the usage of
stored data in the EHR system and non-maleficence with how the stored data
is protected.
INFORMATICS ETHICS
• Informatics ethics is about the ethical behavior expected from an individual
assigned to handle information.

SEVEN PRINCIPLES OF INFORMATION ETHICS


1. Principle of Information-Privacy and Disposition
2. Principle of Openness
3. Principle of Security
4. Principle of Access
5. Principle of Legitimate Infringement
6. Principle of Least Intrusive Alternative
7. Principle of Accountability
SOFTWARE ETHICS
• The ethical duties and responsibilities of software developers to the
stakeholders (society, institution and employees and the profession).
1. They should execute all system activities with the best interest of the
society in mind.
2. They should disclose any threats or known defects in the software.
3. They should ensure that completed activities serve the best interests of
the institution and its employees.
4.They should be straightforward about their personal limitations and
qualifications.
5.They must build products that meet the professional standards through
testing and detailing unresolved issued.
PRIVACY, CONFIDENTIALITY,
SECURITY
• Privacy generally applies to individuals and their aversion to
eavesdropping.
• Confidentiality is more closely related to unintended disclosure of
information.

Significant reasons to protect privacy and confidentiality:


1. Privacy and confidentiality are widely regarded as rights of all people.
2. Protection of these rights is ultimately advantageous for both
individuals and society
3. Protection of privacy and confidentiality benefits public health.
Levels of Security in Hospital
Information System
Safeguard are solutions and tools which may be utilized to
implement security policies at different levels of health
organization such as administrative, physical, and technical.
Table
14.1
The National Research Council (1997) emphasizes that technological
security tools are essential components of modern distributed health care
information systems, and that they serve five key functions:
1. Availability- ensuring accurate and up-to-date information is available
2. Accountability- helping to ensure that health care provides are
responsible for their access
3. Perimeter identification- knowing and controlling the boundaries to
trusted access
4. Controlling access- enabling access for health care provides only to
information essential to the performance of their jobs
5. Comprehensibility and control- ensuring that record owners, data
stewards and patients understand and have effective control over
appropriate aspects of information privacy and access.
Table
14.2
Table
14.3
PHILIPPINE DATA PRIVACY ACT
OF 2012 (RA 10173)
• The Data Privacy Act of 2012 aims to protect the fundamental human
right of privacy of communication while ensuring free flow of
information to promote innovation and growth.
• Protect individuals from unauthorized processing of personal
information that is private, not publicly available; and identifiable
• The Data Privacy Act of 2012 provides that consent must be
documented and given prior to the collection of all forms of personal
data; and the collection must be declared, specified, and used for
legitimate purpose.
PHILIPPINE DATA PRIVACY ACT
OF 2012 (RA 10173)
INFORMATION ASSETS:
• About an individual’s race, ethnic origin, marital status, age, color and
religious, philosophical or political affiliations
• About an individual’s health, education, genetic or sexual life or a
person, or to any proceeding or any proceeding or any offense
committed or allegedly committed
• Issued by government agencies “peculiar” (unique) to an individual,
such as social security number
Violations of the Data Privacy Act
• Unauthorized processing
• Processing for unauthorized purposes
• Negligent access
• Improper disposal
• Unauthorized access or intentional breach
• Concealment of breach involving sensitive personal information
• Unauthorized disclosure; and
• Malicious disclosure.
Republic Act No. 1073, Ch. 8, Sec. 33
• Any combination or series of acts shall make a person subject
to imprisonment ranging from three to six years, and a fine of
not less than one million pesos (Php 1,000,000.00) but not more
than five million (PhP 5,000,000.00)
Key Points to Remember
• Health informatics ethics is the application of the principles of ethics
to the domain of health informatics. There are three main aspects of
health informatics ethics: general ethics, informatics, and software.
• General ethics covers autonomy, beneficence and non-maleficence.
• Informatics refers to privacy, openness, security, access,
infringement, least intrusion and accountability.
• Software developers should consider the best interest of the society
in general, the institution and its employees, and profession.
• Administrative, Physical and technical safeguards are placed to
regularly monitor effectiveness and assess the health IT
environment.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy