Professional Documents
Culture Documents
Lesson 14 Ethics Privacy and Security
Lesson 14 Ethics Privacy and Security
Lesson 14 Ethics Privacy and Security
ETHICS,PRIVACY,
AND SECURITY
INTRODUCTION
The majority of healthcare Healthcare informatics deals with
professionals now depend on questions of right and wrong,
honorable deeds, and suitable and
mechanical assistance when improper behavior.
administering patient care as a
result of modernization in the
field. Nonetheless, the truth
remains that the healthcare
profession's research and
practice should be guided by
human values.
14.1. ETHICS IN HEALTH INFORMATICS
• healthcare
• informatics
• software
GENERAL
HEALTH
INFORMATICS INFORMATICS
ETHICS
SOFTWARE
GENERAL
AUTONOMY
BENEFICENCE
NON-MALEFICENCE
AUTONOMY -
IS THE BELIEF THAT NO HUMAN BEING HAS THE RIGHT
OR DUTY TO RULE OVER ANOTHER.
NON
MALEFICENCE relates most significantly with the
use of data protection.
INFORMATICS ETHICS.
INFORMATION- • all have the right to privacy; control over the collection, storage, access, use,
communication, manipulation, linkage and disposition of data.
PRIVACY
• collection, storage, access, use, communication, manipulation, linkage and disposition
OPENNESS of data must be disclosed in an appropriate and timely fashion to the subject or subjects
of those data.
• data collected about person should be protected by all reasonable and appropriate
SECURITY measures against loss, degradation, unauthorized destruction, access,use,
manipulation,linkage,modification or communication
• right of access and right to correct thrm with respect to its accuracy,
ACCESS completeness, and relevance.
• all have the right to privacy; control over the collection, storage, access, use,
LEGITIMATE communication, manipulation, linkage and disposition of data.
INFRINGEMEN
INFORMATICS ETHICS.
• Any violation of an individual's right to privacy may only take
LEAST
place in the least visible manner and with the least amount of
INTRUSIVE interference with the rights of the parties involved.
ALTERNATIVE • Any violation of an individual's right to privacy must
ACCOUNTABILITY be properly and promptly justified.
SOFTWARE ETHICS
HIE - relies on use of software to store and process information. As a result, activities carried out by
developers might significantly affect end-users.
Software developers has ethical duties and responsibilities to the following stakeholders:
• society
• Institutions and employees
• profession
SOFTWARE ETHICS
Privacy and confidentiality in relation to security are established; the next focus would be on
safeguards, or the solution tools that may be utilized to implement your security policies.
Technical -automated process to protect the software and database access and control.
EXAMPLES OF ADMINISTRATIVE, PHYSICAL, AND TECHNICAL SAFEGUARDS
1. Availability -ensuring that accurate and up-to-date information is available when needed at
appropriate process.
2. Accountability - helping to ensure that healthcare providers are responisble for their access to and
use of information, based on a legitimate need and right to know.
3. Perimeter Identification - knowing and controlling the boundaries of trusted access to the information
system, both physically and logically.
4. Controlling Access - enabling access for healthcare providers only to information essential to the
performance of their jobs and limiting the real or perceived temptation to access information beyond
a legitimate need.
5. Comprehensability and control - ensuring that record owners, data stewards, and patients understand
and have effective control over appropriate aspects of information privacy access.
LEVELS OF SECURITY IN THE LABORATORY INFORMATION SYSTEM
LEVELS OF SECURITY IN THE LABORATORY INFORMATION SYSTEM
LEVELS OF SECURITY IN THE LABORATORY INFORMATION SYSTEM