Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
13 views27 pages

His Report

The document discusses the importance of ethics, privacy, and security in health informatics, emphasizing the need for ethical principles in the use of decision-support systems and electronic health records (EHRs). It outlines various ethical principles related to informatics, software, and the necessity of safeguarding patient information through administrative, physical, and technical measures. Additionally, it highlights the balance between patient autonomy and the integrity of health data, advocating for responsible management of health information systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views27 pages

His Report

The document discusses the importance of ethics, privacy, and security in health informatics, emphasizing the need for ethical principles in the use of decision-support systems and electronic health records (EHRs). It outlines various ethical principles related to informatics, software, and the necessity of safeguarding patient information through administrative, physical, and technical measures. Additionally, it highlights the balance between patient autonomy and the integrity of health data, advocating for responsible management of health information systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

LESSON 14

EHTICS , PRIVACY,
AND SECURITY
Health Information System
for Medical Laboratory Science
INTRODUCTION

Modernization in healthcare has led to the tendency of most


practitioners to rely on the use of mechanical aids throughout the
process of providing patient treatment. However, the fact remains
that human values should continue to govern research and
practice in the healthcare profession. Healthcare informatics
encompasses issues of proper and improper behavior, honorable
actions, and of right and wrong.
ETHICAL PRINCIPLES FOR APPROPRIATE
USE OF DECISION-SUPPORT SYSTEMS
A computer program should be used in clinical practice only after appropriate

1 evaluation of its efficacy and the documentation that it performs its intended
task at an acceptable cost in time and money.

All uses of informatics tools, especially in patient care, should be preceded by

2 adequate training and instruction, which should include review of applicable


product evaluations.

Users of most clinical systems should be health professionals who are qualified

3 to address the question at hand on the basis of their licensure, clinical training,
and experience. Software systems should be used to augment or supplement,
rather than to replace or supplant, such individual's decision-making.
ETHICS IN HEALTH
INFORMATICS

Health informatics ethics (HIE) is the application of


the principles of ethics to the domain of health
informatics. There are three main aspects of health
informatics: healthcare informatics, and software.
Information systems are developed in order to assist
in the dispensation of healthcare or other
supplementary services.
HEALTH INFORMATICS ETHICS

General Informatics Software

Privacy
Autonomy Society
Openness
Benificence Institution and
Security
Non-malficence Employees
Access
Profession
Infringement
Least Intrusion
Accountability
In a general sense, autonomy is defined as either allowing
individuals to make their own decisions in response to a
particular societal context, or as the idea that no one human
person does not have the authority nor should have power
over another human person. Electronic health records (EHR)
must maintain respect for patient autonomy, and this entails
certain restrictions about the access, content, and
ownership of records.
When patients are given too much control over their EHRs,
this could defeat the purpose of the use of such a document
because critical information might be modified or deleted
without the knowledge of the health professionals. Limiting
patient access and control over patient records improves
document quality, because they can become proofreaders of
their own patient history (Mercuri, 2010).
These two principles are respectively defined as "do good"
and "do no harm." In health informatics, beneficence relates
most significantly with the use of the stored data in the EHR
System, and non-maleficence with data protection.
Deeply-integrated EHR systems will contain substantial
amounts of raw data, and great potential exists for the
conduction of groundbreaking biomedical and public health
research, These kinds of research will be beneficial to both
the individual patient, and to the entirety of society. With this
in mind, new EHR systems should be developed with the
capacity to allow patients to release information from their
EHRs, which can be valuable to researchers and scientists.
INFORMATICS ETHICS
Informatics ethics, on the other hand, involves the ethical
behavior required of anyone handling data and information,
as prescribed by the International Medical Informatics
Association (2016).

1. Principle of Information-Privacy and Disposition

2. Principle of Openness

3. Principle of Security
INFORMATICS ETHICS

4. Principle of Access

5. Principle of Legitimate Infringement

6. Principle of the Least Intrusive Alternative

7. Principle of Accoutability
SOFTWARE ETHICS

Health informatics ethics heavily relies on use of software to store


and process information. As a result, activities carried out by
software developers might significantly affect end-users. The
software developer has ethical duties and responsibilities to the
following stakeholders: society, institution and employees, and
the profession.
SOFTWARE ETHICS

Activities should be carried out with the best interest of the


society in mind.

Activities must be done in the best interests of the institution and


its employees, while balancing their duties to the public, including
being straightforward about personal limitations and
qualifications.

Software products should meet expected professional standards.


PRIVACY, CONFIDENTIALITY, AND SECURITY

Privacy and confidentiality are often used interchangeably,


but they are not synonymous. Privacy generally applies to
individuals and their aversion to eavesdropping, whereas
confidentiality is more closely related to unintended
disclosure of information.
PRIVACY, CONFIDENTIALITY, AND SECURITY

There are numerous significant reasons to protect privacy and


confidentiality. (1) One is that privacy and confidentiality are
widely regarded as rights of all people which merits respect
without need to be earned, argued, or defended. (2) Secondly,
protection of privacy and confidentiality is ultimately
advantageous for both individuals and society.
LEVELS OF SECURITY IN THE HOSPITAL INFORMATION SYSTEM

Safeguards can be on an Administrative (may be


implemented by the management as organization-wide
policies and procedures), Physical (mechanisms to protect
equipment, systems, and locations), or Technical Level
(automated processes to protect the software and database
access and control)

It is important to note that the types of safeguards you


choose may be prescribed or restricted by law and its cost-
benefit principle.
EXAMPLES OF ADMINISTRATIVE, PHYSICAL, AND TECHNICAL SAFEGUARDS

l Continual risk assessment of your health IT environment


l Continual assessment of the effectiveness of safeguards for
electronic health information
l Detailed processes for viewing and administering electronic
ADMINISTRATIVE health information
SAFEGUARDS l Employee training on the use of health IT to appropriately
protect electronic health information
l Appropriately reporting security breaches (e.g.. to those
entities required by law or contract) and ensuring continued
health IT operations

Office alarm systems


PHYSICAL Locked offices containing computing equipment that store
electronic health information
SAFEGUARDS
Security guards
EXAMPLES OF ADMINISTRATIVE, PHYSICAL, AND TECHNICAL SAFEGUARDS

Securely configured computing equipment


Certified applications and technologies that store or exchange
electronic health information
TECHNICAL
Access controls to health IT and electronic health information
SAFEGUARDS Encryption of electronic health information
Auditing of health IT operations
Health IT backup capabilities
LEVELS OF SECURITY IN THE LABORATORY INFORMATION SYSTEM

KEY STEPS IN LABORATORY INFORMATION FLOW FOR A HOSPITAL PATIENT

STEP DESCRIPTION

Patient Record Creation


Automatic Data Transfer
Register Patient
Hospital Admission

Physician Test Orders


Timing of Collection
Order Tests
Order Entry and Transfer
KEY STEPS IN LABORATORY INFORMATION FLOW FOR A HOSPITAL PATIENT

Pre-collection Preparation
Barcode Labels
Collect Sample
Barcode Details
Sample Sorting

Status Update: Upon arrival in the laboratory, sample


status must be updated in the LIS from "collected" to
Receive Sample "received."
Barcode Scanning
Order Transmission
KEY STEPS IN LABORATORY INFORMATION FLOW FOR A HOSPITAL PATIENT

Automated Analyzer Loading


Automated Test Recognition
Run Sample
No Work List for Automated Tests
Manual Test Work List

Results Transmission
Review Results Technologist-Only Access
Flagging System
KEY STEPS IN LABORATORY INFORMATION FLOW FOR A HOSPITAL PATIENT

Result Release by Technologist


Release Results Automated Release Option
Transmission to CIS

Physician Access
Report Results
Report Printing
Source: McPherson and Pincus. (2017). Henry's Clinical Diagnosis and Management by Laboratory Methods.
LEVELS OF SECURITY IN THE LABORATORY INFORMATION SYSTEM

SAFEGUARDS FOR THE LABORATORY INFORMATION SYSTEM

Continuous employee training on the use of the LIS


Periodic review of standards in identifying which results
should be flagged
Strengthen laboratory authorization and supervision policies
Implement strict rules and regulations regarding the testing
Administrative
procedures
Safeguards
Release guidelines on proper disposal of laboratory
specimen
Enforce policies on the proper use of laboratory
workstations
Impose disciplinary measures as needed
SAFEGUARDS FOR THE LABORATORY INFORMATION SYSTEM

Periodic maintenance of laboratory equipment


Biometrics or other security protocol for laboratory
access
Physical Controlled temperature both for equipment and
Safeguards specimen
Contingency operations plan
Use of appropriate personal laboratory safety
equipment
SAFEGUARDS FOR THE LABORATORY INFORMATION SYSTEM

Automated identity confirmation procedures for


users requesting access
Technical
Regular change of username and password
Safeguards
Different access capabilities based on user position
Automatic log-off after long periods of inactivity
THANK
YOU! BAIFARISHA DACULA
MUHAJIREN ABDULLATIP
NORAIPA ADAM
NORJIANNAH ABDULLAH
SHAINA AMEL
ALIMAR BADI
SITTIE ANAISA BAGUNDANG
ALMIRA BANSAWAN
NORJUIANA BOGEL
SAMERAH CAMSA
REPORTERS

You might also like