Lesson 14 Ethics Privacy and Security
Lesson 14 Ethics Privacy and Security
ETHICS, PRIVACY
AND SECURITY
ETHICS IN HEALTH INFORMATICS
• Application of the principles of ethics in the domain
of health informatics.
Emil Gatus
Student
Technology helped in the modernization of the
• Number
Lesson
health
Name
1 of care industry, however, this made
practitioners
School
1.1 Definition of to be dependent on the use of
mechanical aids in providing patient treatment.
Vision, Mission, Goals
and Objectives
Conversely,
1.2 Comparison
Vision and Mission
of human values should continue to
govern
1.3 Purpose and research and the actual practice in health
care.
Inclusion of Vision
and Mission
Lesson 2
Lesson 3
• Health care informatics covers issues on honorable
Lesson 4
clinical settings
Lesson 1
School
1.1 Definition of
Vision, Mission, Goals
• determination of users
and Objectives
1.2 Comparison of
Vision and Mission
• system evaluation
1.3 Purpose and
Inclusion of Vision
and Mission
• system development,
Lesson 2
Lesson 3
Lesson 4
of health informatics.
Vision, Mission, Goals
and Objectives
1.2 Comparison of
The three main aspects
Vision and Mission
1.3 Purpose and
of information ethics:
Inclusion of Vision
and Mission
Lesson 2
Lesson 3
Lesson 4
Lesson 5
Lesson 6
• general ethics
Lesson 7
Lesson 8 • informatics ethics
Lesson 9
Lesson 10
Lesson 11 • software ethics
Lesson 12
Lesson 13
Lesson 14
Lesson 15
General Ethics
In public health, general ethics guide the
reasoning
Emil Gatus
and decision–making of all people and
organization
Student involved in healthcare.
Number
1. Autonomy
Name of
Lesson 1
School
• Autonomy is defined as either allowing
1.1 Definition of
Vision, Mission, Goals
and Objectives
control.
Lesson 2
Lesson 3
Lesson 4
Lesson2010).
Lesson 10
11
Lesson 12
Lesson 13
Lesson 14
Lesson 15
Informatics Ethics
Informatics ethics is about the ethical behavior
expected from an individual assigned to handle
information. It follows seven principles as
prescribed
Emil Gatus
Student
by the International Medical
Informatics
Number Association (2016).
Name of
1. Principle
Lesson 1
School
1.1 Definition of of
Vision, Mission, Goals
Information-Privacy and
Disposition
and Objectives
1.2 Comparison of
Lesson 4
Lesson 5
he or she has control over the collection,
access, use, communication, manipulation,
Lesson 6
Lesson 7
Lesson 8
Lesson 9
storage, linkage, and disposition of data
Lesson 10
3. Principle of Security
• Legitimately collected data should be
protected through all appropriate
measures against access, use,
modification or communication,
manipulation, linkage, loss,
degradation, and unauthorized
destruction.
4. Principle of Access
Authorized individuals should be given
Emilaccess
Gatus to electronic health records and
also have the right to correct the data with
Student
Number
respect
Name
Lesson 1 of to their completeness, accuracy,
School
1.1 Definition of
and relevance.
Vision, Mission, Goals
and Objectives
1.2 Comparison of
Vision and Mission
1.3 Purpose and
5. Principle of Accountability
Any infringement must be justified to the
concerned individuals in a timely and
appropriate fashion.
Software Ethics
Health informatics ethics relies on the use of the software to
store and process information. It follows that the activities carried
out by the developers might affect the end-users. Therefore
software
Emil Gatus developers have the ethical duties and responsibilities
toStudent
the stakeholders (society, institution and employees, and the
Number
profession).
Name
Lesson 1 of
School
• They should execute all system activities with the best interest
1.1 Definition of
Vision, Mission, Goals
of the society in mind.
and Objectives
1.2 Comparison of
Vision and Mission
• They should disclose any threats or known defects in the
1.3 Purpose and
Inclusion of Vision
software.
and Mission
Lesson 2
Lesson 3
• They should ensure that completed activities serve the best
Lesson 4
Lesson 5
interests of the institution and its employees.
Lesson 6
Lesson 7
Lesson 8
• They should be straightforward about their personal limitations
Lesson 9
Lesson 10
and qualifications.
Lesson 11
Lesson 12
Lesson 13
• They must build products that meet the professional standards
Lesson 14
Lesson 15
PRIVACY, CONFIDENTIALITY AND SECURITY
• Privacy generally applies to individuals and
their
Emil Gatusaversion to eavesdropping.
For
Studentexample, someone who is spying on a
• Number
certain
Name
Lesson 1 of person to find out about his or her
School
1.1 Definition of
visit to an acquired immunodeficiency
Vision, Mission, Goals
and Objectives
more
Inclusion informed decisions.
of Vision
and Mission
Lesson 2
on the following:
Student
Number
system
• Name
Lesson 1 of
School designers
1.1 Definition of
Vision, Mission, Goals
• maintenance personnel
and Objectives
1.2 Comparison of
• administrators
Vision and Mission
1.3 Purpose and
Inclusion of Vision
• physicians
and Mission
Lesson 2
Lesson 3
Lesson 4
• nurses
Lesson 5
Lesson 6
Lesson 7
• other frontline users of the information
Lesson 8
Lesson 9
Lesson 10
Lesson 11
Lesson 12
Lesson 13
Lesson 14
Lesson 15
Levels of Security in the Hospital Information System
• Safeguards are the solutions and tools which may be
utilized to implement security policies at different
levels of health organization.
• May be prescribed or restricted by law
Emil Gatus
• Cost-benefit principle. If it is not cost effective for
Student
Number the institution to avail of an expensive technology
1 toofmitigate a risk to electronic health information,
Name
Lesson
Schoolan
1.1 Definition of
Vision, Mission, alternative is to require the staff to follow a new
Goals
administrative procedure that equally reduces
and Objectives
1.2 Comparison of
that risk. Conversely, if they cannot afford to place
Vision and Mission
Lesson 11 present.
Lesson 10
Lesson 12
Lesson 13
Lesson 14
Lesson 15
Table 14.1 Examples of Administrative, Physical, and Technical Safeguards
• Regular risk assessment of the health IT
environment
Emil Gatus
Student • Continuous assessment of the effectiveness
Number of safeguards for employed for electronic
Name of
Lesson 1
School
1.1 Definition of health information
Vision, Mission, Goals
and Objectives
1.2 Comparison of
• Provide detailed processes and procedure
Vision and Mission
Administrative
1.3 Purpose and
for viewing and administering electronic
Inclusion of Vision
Safeguards
and Mission health information
Lesson 2
Lesson 3
Lesson 4
• Training for the users of health IT to
Lesson 5
Lesson 6
appropriately protect electronic health
Lesson 7
Lesson 8 information
Lesson 9
Lesson 10 • Prompt reporting of security breaches (e.g.,
Lesson 11
Lesson 12
Lesson 13
to those entities required by law or contract)
Lesson 14
Lesson 15
and ensure continued health IT operations
• Place office alarm systems
• Lock offices and areas that contains computing
Physical equipment that store electronic health
Safeguards information
• Have security guards that makes regular rounds
in the vicinity
logically
Lesson 11
Lesson 12
Lesson 13
Lesson 14
Lesson 15
4. Controlling access – enabling
access for health care providers only to
information essential to the performance
of their jobs and limiting the real or
perceived temptation to access
information beyond a legitimate need
5. Comprehensibility and control –
ensuring that record owners, data
stewards, and patients understand and
have effective control over appropriate
aspects of information privacy and access
Levels of Security in the Laboratory Information System
Table 14.2: Key Steps in Laboratory Information Flow for a
hospital patient
STEP DESCRIPTION
The LIS prints a list of all patients who have to be drawn which
also includes the appropriate number of sample bar-code labels
for each patient order.
Emil Gatus
Student Each barcode contains the patient ID, sample contained, and
Number laboratory workstation which is used to sort the tube once it
Collect
Name
Lesson 1 of
Sample School
1.1 Definition of reaches the laboratory.
Vision, Mission, Goals
and Objectives
1.2 Comparison of
Vision and Mission
An increasingly popular approach is for caregivers or nurses to
1.3 Purpose and
Inclusion of Vision collect the blood sample. Sample barcode labels can be printed
and Mission
Lesson 2
Lesson 3 (on demand) at the nursing station on an LIS printer or portable
Lesson 4
Lesson 5 bedside printer prior to collection.
Lesson 6
Lesson 7 Once the sample arrives in the laboratory, the status is updated
Lesson 8
Lesson 9
Lesson 10 in the LIS from “collected” to “received.” This is done by scanning
Receive
Lesson 11
Lesson 12 each sample container’s barcode ID into the LIS. Once the status
Sample
Lesson 13
Lesson 14
Lesson 15
becomes “received” the LIS then transmits the test order to the
analyser who will perform the required test.
The sample is loaded to the analyser, and the bar code is then
read. No work list is needed because the analyser knows what
test to perform from the order provided by the LIS. However,
Run Sample when tests are performed manually, the technologist prints a
work list from the LIS. The work list should contain the names of
the patients and the tests ordered on each and next to each
test is a space to record the result.
The analyser then produces the results and sends the same to the
LIS. The result is only viewable to the assigned technologists until it
Review is released for general viewing. The LIS can also be programmed
Results to flag certain results—for example, critical values—so the
technologist can easily identify what needs to be repeated or
further evaluated.
STEP DESCRIPTION
The technologist is responsible for the release of the results.
Emil Gatus Unflagged results are reviewed and released at the same time.
Student
Number The LIS can be programmed to automatically review and release
Release
Name
Lesson 1 of
School
1.1 Definition of normal results or results that fall within a certain range. This
Results
Vision, Mission, Goals
and Objectives approach reduces the number of tests that a technologist has to
1.2 Comparison of
Vision and Mission
1.3 Purpose and review. The results are automatically transmitted to the CIS upon
Inclusion of Vision
and Mission
Lesson 2
release.
Lesson 3
Report
Lesson 4 The physician can now view the results on the CIS screen. Reports
Lesson 5
Results
Lesson 6 can be printed when needed.
Lesson 7
Lesson 8
Lesson 9
Lesson 10
Lesson 11
Lesson 12
Lesson 13
Lesson 14
Lesson 15
Principles regarding administrative, technological, and physical
safeguards as appliedto the Laboratory Information System
Technical
Vision, Mission, Goals
and Objectives
• Requiring different authorizations
1.2 Comparison of
Vision and Mission
Safeguards
1.3 Purpose and
based on user level
Inclusion of Vision
and Mission
Lesson 2
Lesson 3 • Capacity of the unit to automatically
Lesson 4
Lesson 5
Lesson 6
log-off after a specified period of
Lesson 7
Lesson 8 inactivity
Lesson 9
Lesson 10
Lesson 11
Lesson 12
Lesson 13
Lesson 14
Lesson 15
Philippine Data Privacy Act of 2012
(Republic Act. No. 10173)
Business process management, particularly involving
health information technology, is an increasingly
growing
Emil Gatus industry within the Philippine economy.
Student
With
Number total IT expenditure reaching $4.4 billion in 2016,
Name of
the
Lesson 1 industry
School
1.1 Definition of
is forecasted to go beyond doubling itself
byMission,
Vision, 2020.
Goals In addition, Filipinos utilize social media
1.2heavily,
Comparison of with a whopping 3.5 million users on LinkedIn,
and Objectives
personal
Lesson 8
Lesson 9 information of Filipino citizens
regardless of the place of residence. The main
Lesson 10
Lesson 11
principles that govern the approach for this Act
Lesson 12
proceedings, or regulation.
Inclusion of Vision
and Mission
Lesson 2
The provisions of the law necessitate
Lesson 3
Lesson 4
covered entities to create privacy and
Lesson 5
retention procedures.
Lesson 11
Lesson 12
Lesson 13
Lesson 14
Lesson 15
Penalties
The act provides for different penalties for varying
violations, majority of which include imprisonment. These
violations include:
Emil •Gatus Unauthorized processing
• Processing for unauthorized purposes
Student
• Negligent access
Number
Name of
• ofImproper disposal
Lesson 1
School
1.1 Definition
shall
Lesson 7
Lesson 8 make the person subject to imprisonment ranging
from
Lesson 9 three (3) years to six (6) years, and a fine of not less
than One million pesos (Php1,000,000.00) but not more
Lesson 10
Lesson 11
than
Lesson 12
Lesson 13 Five million pesos (Php5,000,000.00) (Republic Act.
No.14 10173, Ch. 8, Sec. 33).
Lesson
Lesson 15
KEY POINTS TO REMEMBER:
✓ Health informatics ethics is the application of the principles of
ethics to the domain of health informatics. There are three
Emil Gatus
Student
main aspects of health informatics ethics: general ethics,
Number
informatics ethics, and software ethics.
Name
Lesson 1 of
School
1.1 Definition of
✓ General ethics covers autonomy, beneficence, and non-
Vision, Mission, Goals
maleficence.
and Objectives
1.2 Comparison of
Vision and Mission
1.3 Purpose and
✓ Informatics refers to privacy, openness, security, access,
Inclusion of Vision
infringement, least intrusion and accountability.
and Mission
Lesson 2
Lesson 3
Lesson 4
✓ Software developers should consider the best interest of the
Lesson 5
Lesson 6
Lesson 7
society in general, the institution and its employees, and the
Lesson 8profession.
Lesson 9
Lesson 10
✓ Administrative, physical, and technical safeguards are
Lesson 11
Lesson 12
placed to regularly monitor effectiveness and assess the
Lesson 13
health IT environment.
Lesson 14
Lesson 15