Ethics, Privacy, and Security (Week 16)

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

ETHICS, PRIVACY, AND SECURITY

Ethics, Privacy, and Security Guiding Principles of General Ethics

 The modernization in healthcare has led to 1. Autonomy


the tendency of most practitioners to rely
on the use of mechanical aids throughout  It is defined as either allowing
the process of providing patient treatment. individuals to make their own
However, the fact remains that human decisions in response to a
values should continue to govern research particular societal context, or as
and practice in the healthcare profession the idea that no one human
person does not have the
 The healthcare informatics encompasses authority nor should have power
issues of proper and improper behaviour, over another human person
honourable actions, and of right and wrong
 The Electronic health records
 The ethical questions in medicine, nursing, (EHR) must maintain respect for
human subject research, psychology, and patient autonomy, and this entails
other related fields continue to become certain restrictions about the
more twisted and complex, but some access, content, and ownership
overarching issues are common among of records
them
 Limiting patient access and
 The ethical issues in health informatics, on control over patient records
the other hand, are less familiar, even if improves document quality
some of them have been controversial for because they can become proof-
decades readers of their own patient
history (Mercuri, 2010)
 The informatics also raises questions
about various legal and regulatory 2. Beneficence and Non-maleficence
requirements
 These two principles are
 The computer program should be used in respectively defined as “do good”
clinical practice only after appropriate and “do no harm.” In health
evaluation of its efficacy and the informatics, beneficence relates
documentation that it performs its intended most significantly with the use of
task at an acceptable cost in time and the stored data in the EHR
money system, and non-maleficence with
data protection
 All uses of informatics tools, especially in
patient care, should be preceded by  Deeply integrated EHR systems
adequate training and instruction, which will contain substantial amounts
should include review of applicable product of raw data, and great potential
evaluations exists for the conduction of
ground-breaking biomedical and
 The users of most clinical systems should public health research. These
be health professionals who are qualified kinds of research will be
to address the question at hand on the beneficial to both the individual
basis of their licensure, clinical training, patient, and to the entirety of
and experience society

 With this in mind, new EHR


systems should be developed
with the capacity to allow patients
to release information from their
EHRs which can be valuable to
researchers and scientists.
Similarly, the available
consolidated from clinical data
repositories will be able to allow
healthcare professionals to
provide the best possible
treatments for their patients,
further upholding the principle of
beneficence
ETHICS, PRIVACY, AND SECURITY

3. Informatics Ethics to those records and the right to


correct them with respect to its
 The informatics ethics, on the accurateness, completeness, and
other hand, involves the ethical relevance
behaviour required of anyone
handling data and information, as 8. Principle of Legitimate Infringement
prescribed by the International
Medical Informatics Association  The fundamental right of privacy
(2016) and of control over the collection,
storage, access, use,
 It covers seven principles: manipulation, linkage,
communication and disposition of
 Privacy personal data is conditioned only
by the legitimate, appropriate and
 Openness relevant data-needs of a free,
responsible and democratic
 Security society, and by the equal and
competing rights of others
 Access
9. Principle of the Least Intrusive
 Legitimate Infringement Alternative

 Least Intrusive  Any infringement of the privacy


Alternatives rights of a person or group of
persons, and of their right of
control over data about them,
 Accountability
may only occur in the least
intrusive fashion and with a
4. Principle of Information-Privacy and
minimum of interference with the
Disposition
rights of the affected parties
 All persons and group of persons
10. Principle of Accountability
have a fundamental right to
privacy, and hence to control over
 Any infringement of the privacy
the collection, storage, access,
rights of a person or group of
use, communication,
persons, and of the right to
manipulation, linkage, and
control over data about them,
disposition of data about
must be justified to the latter in
themselves
good time and in an appropriate
fashion
5. Principle of Openness
Software Ethics
 The collection, storage, access,
use, communication,
 The health informatics ethics heavily relies
manipulation, linkage, and
on use of software to store and process
disposition of personal data must
information. As a result, activities carried
be disclosed in an appropriate
out by software developers might
and timely fashion to the subject
significantly affect end-users. The software
or subjects of those data
developer has ethical duties and
responsibilities to the following
6. Principle of Security
stakeholders: society, institution and
employees, and the profession
 The data that have been
legitimately collected about
 The activities should be carried out with
persons or groups of persons
the best interest of the society in mind.
should be protected by all
Developers should be mindful of social
reasonable and appropriate
impacts of software systems. This includes
measures against loss
disclosing any threats or known defects in
degradation, unauthorized
software
destruction, access, use,
manipulation, linkage,
Privacy, Confidentiality and Security
modification, or communication

7. Principle of Access  The privacy generally applies to individuals


and their aversion to eavesdropping,
whereas confidentiality is more closely
 The subjects of electronic health
related to unintended disclosure of
records have the right of access
information
ETHICS, PRIVACY, AND SECURITY

 There are numerous significant reasons to


protect privacy and confidentiality. One is
that privacy and confidentiality are widely
regarded as rights of all people which
merits respect without need to be earned,
argued, or defended. Secondly, protection
of privacy and confidentiality is ultimately
advantageous for both individuals and
society. Patients are more likely to be
comfortable to share sensitive health care
data when they believe this information
would not be shared inappropriately

 This kind of trust is essential in


establishing a successful physician-
patient or nurse-patient relationship, and it
enabled practitioners to perform their jobs
better

 The privacy and confidentiality protection


also benefits public health. When people
are not afraid to disclose personal
information, they are more inclined to seek
out professional assistance, and it will
diminish the risk of increasing untreated
illnesses and spreading infectious
diseases (Goodman, 2016)
 The National Research Council (1997)
Levels of Security in the Hospital Information emphasizes that technological security
System tools are essential components of modern
distributed health care information
 It is important to note that the types of systems, and that they serve five key
safeguards you choose may be prescribed functions:
or restricted by law. Another important
consideration is the cost-benefit principle. 1. Availability
If it is not cost effective for your practice to
avail of an expensive technology to  It is ensuring that accurate and
mitigate a risk to electronic health up-to-date information is available
information, an alternative may be when needed at appropriate
requiring your staff to follow a new places
administrative procedure that equally
reduces that risk 2. Accountability

 Conversely, if you cannot afford to place  It is helping to ensure that health


additional burden on your staff due to care providers are responsible for
possibilities of human error, you may their access to and use of
choose to purchase a technology that information, based on a legitimate
automates the procedure in order to need and right to know
minimize the risk
3. Perimeter Identification
 Regardless of the type of safeguard your
practice chooses to implement, it is  It is knowing and controlling the
important to monitor its effectiveness and boundaries of trusted access to
regularly assess your health IT the information system, both
environment to determine if new risks are physically and logically
present
4. Controlling Access

 It is enabling access for health


care providers only to information
essential to the performance of
their jobs and limiting the real or
perceived temptation to access
information beyond a legitimate
need
ETHICS, PRIVACY, AND SECURITY

5. Comprehensibility and Control  The main principles that govern the


approach for the Data Privacy act include:
 It is ensuring that record owners,
data stewards, and patients  Transparency
understand and have effective
control over appropriate aspects  Legitimacy of purpose
of information privacy and access
 Proportionality

 Consent is one of the major


elements highly valued by the
Data Privacy Act. The act
provides that consent must be
documented and given prior to
the collection of all forms of
personal data, and the collection
must be declared, specified, and
for a legitimate purpose

 Furthermore, the subject must be notified


about the purpose and extent of data
processing, with details specifying the
need for automated processing, profiling,
direct marketing, or sharing. These factors
ensure that consent is freely given,
specific, and informed

 However, an exception to the requirement


of consent is allowed in cases of
contractual agreements where processing
Philippine Data Privacy Act of 2012 is essential to pursue the legitimate
interests of the parties, except when
 The Business Process Management, overridden by fundamental rights and
particularly involving Health Information freedom. Such is also the case in
Technology, is an increasingly growing responding to national emergencies
industry within the Philippine economy.
With total IT expenditure reaching $4.4  The processing of sensitive and personal
Billion in 2016, the industry is forecasted to information is also forbidden, except in
more than double itself by the year 2020. particular circumstances enumerated
In addition, Filipinos utilize social media below. The Data Privacy Act describes
heavily, with a whopping 3.5 million users sensitive personal information as those
on LinkedIn, 13 million on Twitter, and 42.1 being:
on Facebook (Wall, 2017)
 Individual’s race
 Given the rapid evolution of the digital
economy and heightened international  Ethnic origin
data trading, the Philippines has decided
to strengthen its privacy and security  Marital status
protection by passing the Data Privacy Act
of 2012, with an aim “to protect the  Age
fundamental human right of privacy, of
communication while ensuring free flow of  Color
information to promote innovation and
growth.” (Republic Act. No. 10173, Ch. 1,  Religious
Sec. 2)
 Philosophical or political
 The Data Privacy Act applies to individuals affiliations
and legal entities that are in the business
of processing personal information. The  Health
law applies extraterritorially, applying both
to companies with offices in the  Education
Philippines, and even those located
outside, but which use equipment based in  Genetic or sexual life of a person
the Philippines. It covers personal
information of Filipino citizens regardless
of the place of residence
ETHICS, PRIVACY, AND SECURITY

 Any proceeding or any offense years, and a fine of not less than one
committed or alleged to have million pesos (Php1,000,000.00) but
committed not more than five million pesos
(Php5,000,000.00) (Republic Act. No.
 Issued by government agencies “peculiar” 10173, Ch. 8, Sec. 33)
(unique) to an individual, such as social
security number

 Marked as classified by executive order or


act of Congress

 The exceptions are:

 Consent of the data subject

 Pursuant to law that does not


require consent

 Necessity to protect life and


health of a person

 Necessity for medical treatment

 Necessity to protect the lawful


rights of data subjects in court
proceedings, legal proceedings,
or regulation

 The provisions of the law


necessitate covered entities to
create privacy and security
program to improve the collection
of data, limit processing to
legitimate purposes, manage
access, and implement data
retention procedures

Penalties

 The act provides for different penalties for


varying violations, majority of which
include imprisonment. These violations
include:

a. Unauthorized processing

b. Processing for unauthorized purposes

c. Negligent access

d. Improper disposal

e. Unauthorized access or intentional


breach

f. Concealment of breach involving


sensitive personal information

g. Unauthorized disclosure

h. Malicious disclosure

i. Any combination or series of acts


enumerated above shall make the
person subject to imprisonment
ranging from three (3) years to six (6)

You might also like