You are on page 1of 57

breach this trust are grounds for

WEEK 11: CONFIDENTIALITY AND MANAGEMENT consequences.


OF HEALTHCARE INFORMATION - Example: psychotherapy ward → patient is
encouraged to take risks by disclosing
personal information in the hopes of quality
I. CONFIDENTIALITY: A PRINCIPLE WITH
QUALIFICATIONS care. (if patient does not disclose or has lost
- Keeping private information is the easiest confidence, then care would be limited and
principle to understand but the hardest to ineffective)
honor
- Invasion of Privacy → unjustifiable intrusion DUTY-ORIENTED PERSPECTIVE
into the personal life of another without consent - Personal privacy is a basic right
(eg. talking about a patient in the cafeteria or - Foundation of such:
gossiping is a breach of trust) ● Professional practice
- Foundation of Trust → belief that privacy will be ● Common law
honored which gives patients freedom to share - Common violations of confidentiality are
sensitive information grounds for lawsuits and cases:
● Unwarranted disclosure of private
CONFIDENTIALITY- the state of keeping or being kept affairs
secret or private ● Unauthorized use of photograph
- This is an expectation of the patient-provider ● Exploitation of person’s name
relationship and dates way back. These examples give rise to legal action on
- Early Greeks the grounds og invasion of right to privacy.
● first healthcare practitioners who - Individuals in the society have the
pledged to respect confidentiality autonomous right to control their personal
● Inscribed patient information along the information and protect personal privacy
walls of the temple and limiting access
to others not part of the care group
- Right to Confidentiality of the patient can be PRIVACY CONFIDENTIALITY
defended with the use of the four systematic Person’s right Professional’s duty
approaches to ethical decision making

VIRTUE ETHICS PERSPECTIVE


FOUR SYSTEMATIC APPROACHES TO ETHICAL
- Confidentiality is one that forms a virtue of a
DECISION MAKING
good practitioner
1. Utilitarian Ethics - outcome based
- Confidentiality → critical principle
2. Deontological Ethics - duty based
- Patient information can be shared among
3. Virtue Ethics - virtue based
practitioners in the account of care but are not
4. Divine Command - faith based
allowed to take place in elevators, cafeterias
or parties.
In terms of Confidentiality, the end point of these
approaches agree upon each other → there is no
REAL QUESTION: IS CONFIDENTIALITY A MORAL
argument to such right
ABSOLUTE?
- The answer would be no. Medical
UTILITARIAN PERSPECTIVE
practitioners are allowed to share patient
- Long-term consequences of disclosing
information only when in collaboration of the
information to the public is the chilling effect
care for the client. Any situation outside care
on the relationship
disclosure is a breach in confidentiality.
● Chilling Effect → discouraging free
speech and association rights
- Healthcare practitioners are conducted under
tacit agreement (meaning they choose to
agree upon certain terms) that those who

BUENA.FETILUNA.MONTERO.FRANCISCO.MORRE.JESENA.KUIZON.TUICO.TECSONK | BSN 2C
WHEN CAN CONFIDENTIALITY BE LEGALLY
Right to Privacy Zone of Privacy
BROKEN?
- When a patient is endangering himself/herself - Generic concept - Described by
or when he/she possesses a threat to the encompassing a Justice Douglas
safety of the people around him. variety of rights - Forbade
thought to be governmental
necessary for intrusion into the
TARASOFF CASE
ordered democracy homes and lives of
A famous case involving a psychiatric patient, citizens
Prosenjit Poddar, who told his doctor that he intends
to kill a woman named Tatiana. When the doctor knew
of this, he admitted the patient for 72 hours for This constitutional recognition of a right to privacy and
observation. However, the patient convinced the self determination formed the basis of the Roe v.
security guards that he was rational and sane and Wade case in 1973.
promised to stay away from the girl.
Roe v. Wade (1973)
The next day, the man killed the girl. - A legal case in the United States Supreme
Court on January 22, 1973, ruled that the
It is at this time that healthcare practitioners are to Constitution of the United States protects a
keep patient confidentiality no matter what since they pregnant woman’s liberty to choose to have
were not required to protect the lives of others but an abortion without excessive government
their patient. restriction.

Later on, the Code of Ethics added an addition to the The Supreme Court determined that a woman’s right
principle of confidentiality which is the Harm to make this personal choice rested on;
Principle. 1. The avoidance of disclosing personal matters
2. The need to provide for an arena where
HARM PRINCIPLE OF CONFIDENTIALITY independent decision making could take
- A principle that gives power to healthcare place.
practitioners to break confidentiality and report
the situation when patients are endangering We have the right to;
themselves or endangering the people around - Make fundamental choices involving
them. ourselves, our families, and our relationships
- The healthcare practitioners are given the with others free from scrutiny as long as these
power to break trust and confidentiality only assertion of these rights is consistent with the
when harm comes to people. law or public policy
- Maintain our private lives
COMMON CASE: WHAT WOULD WE DO IF WE - Restrict the collection, processing, use, and
HAVE AN HIV POSITIVE PATIENT? dissemination of information about our
- Be discrete with the information since the HIV personal attributes and activities
disease is surrounded with issues like
discrimination and deprivation of rights. The law provides legal redress against those who
- Only healthcare providers who are assigned would infringe on our legitimate right to privacy from
to the case should know. Certain measures motives of malice, greed, curiosity, or gain.
should be made to prevent the family of the
patient from acquiring the disease. The
Four Classes of Tort Actions
healthcare provider may tell the direct SO of
1.) Misappropriation
the patient to help with preventive measures.
- Deals with the unpermitted use of a
person’s name or likeness for another’s
benefit or advantage
II. LEGAL FOUNDATION OF PRIVACY
2.) Intrusion

BUENA.FETILUNA.MONTERO.FRANCISCO.MORRE.JESENA.KUIZON.TUICO.TECSONK | BSN 2C
- Involves the intrusion upon another’s ● Maintained privacy
solitude or seclusion; a clinical
example might be the allowance of Present
unessential or lay personnel to be ● Electronic/Paperless
present during a surgical procedure or ● Easily accessed
examination. ● Accessed by many
3.) Public disclosure of private facts ● Prone to be stolen and misused
- Involves publicity of an objectionable
nature of private information Today over 80% of direct patient care is provided by
4.) Presenting someone in a false light to the allied health and nursing professionals. In the
public hospital, only about a third of the patient’s record is
- Involves publication of information that maintained by physicians, with the rest being
leads to the public regarding the recorded by other members of the medical team.
plaintiff falsely.
On average, 5 days of inpatient care within a teaching
Many state statutes and few federal regulations hospital as 150 staff (from nursing, respiratory care,
require the reporting of certain types of information radiology, and billing clerks) have legitimate access to
from the medical record, to appropriate agencies with a patient’s record to provide both direct and/or
or without the patient’s authorization. supportive services

Common Legal Reporting Requirements


A patient’s data can be used for:
● Child abuse
1. Administration
● Drug abuse
2. Payment
● Communicable disease
3. Utilization Review
● Births and deaths
4. Teaching
● Injuries with guns or knives
5. Research
● Blood transfusion reactions
● Poison and industrial accidents
● Misadministration of radioactive materials
Aside from the health care team, who gets access to
These reporting requirements deal with issues the patient’s records? They can be:
thought to be vital to community health and welfare. ● Insurance Companies
- they pay the bills
In absence of a legal regulation to provide patient ● Public Health Agencies
information, a police agency has NO authority to - to assist in monitoring and investigating
examine a medical record without the patient’s disease outbreak pattern
authorization ● Employers
- to assess job-related injuries
III. MODERN HEALTHCARE AND ● Local Government Agencies
CONFIDENTIALITY - to develop health care programs and
allocate resources
Medical Records: ● Attorneys and Law Enforcement
- as evidence for civil or criminal matters
Past ● Media
● Paper charts - to report health hazards or reports health
● Poorly indexed research developments
● Poor handwriting ● Accreditation, Licensing, Certification
● Less “outside” access Agencies
● Accessed by physician and small direct care - to assess compliance with various criteria
staff and standards
● Third-Party Payers

BUENA.FETILUNA.MONTERO.FRANCISCO.MORRE.JESENA.KUIZON.TUICO.TECSONK | BSN 2C
By the early 1990’s, it was clear that the use of ○ To protect and enhance the rights of
computers and complex database retrieval systems consumers by providing them access
was making confidentiality of patient information to their health information and
difficult to maintain. controlling the inappropriate use of
that information.
*there was an incident in which surplus computers ○ To improve the quality of healthcare in
sold by medical schools and other agencies, and in the United States by restoring trust in
those computers still contained information regarding the healthcare system among
case details of thousands of patients* consumers, healthcare practitioners,
and the multitude of organizations
committed to the delivery of care,
○ To improve the efficiency and
Prior to the enactment of HIPAA (Health Insurance
Portability and Accountability Act) and the Privacy effectiveness of healthcare delivery by
Rule there was no unifying federal privacy act for creating a national framework for
medical records. health privacy protection that builds on
efforts by states, health systemd,
NEWS: individual organizations, and
individuals.
Massive Hack of Hospital Network Files - 4.5
Million Records ● Those required to follow HIPAA Privacy Rule:
UCLA Hospital System’s President, Dr. James ○ Doctors, nurses, allied health
Atkinson, apologized to the public for the potential professionals, pharmacies, hospitals,
loss of millions of records. Information lost included clinics, nursing homes, and many
patient’s names, medical information, Social other healthcare providers.
Security Numbers, Medicare Numbers, health plan ○ Most employer health plans, HMOs,
IDs, birthdays, and physical addresses. The and health insurance companies.
hospital group is not notifying staff and patients,
○ Certain government programs that pay
offering them one year of identity theft recovery.
for health care, such as Medicare and
THe UCLA system is just one of many health Medicaid.
systems who have lost control of millions of
records. Their systems are under near constant ● Protected information:
attack by hackers, some of which are operating in ○ Information your doctor, nurses, and
foreign countries. Hospitals, health insurance other healthcare providers put in your
companies, and universities have all become a
frequent targets for hackers seeking massive medical record.
databases of personal information. Profile data, ○ Conversations your doctor had about
Social Security Numbers,and health records sell on your care or treatment with nurses and
the black market. Illegal data brokers amass large other healthcare professionals.
databases of this stolen information and then sell ○ Information about you in your health
access to identity thieves. insurer’s computer system.
○ Billing information about you from your
IV. HEALTH INSURANCE PORTABILITY AND clinic/healthcare provider.
ACCOUNTABILITY ACT (HIPAA) ○ Most other health information about
● Enacted by the Congress in 1996 to: you, held by those who must follow
○ Encourage the use of electronic this law.
transmission of health information
○ Assist in cost containment ● Information can be used and shared:
○ Provide new safeguards to protect the ○ For treatment and care coordination.
security and confidentiality of the ○ To pay physicians and hospitals for
information the patient’s health care.
● HIPAA has three self-declared major purposes ○ With family, relatives, friends, and
others the patient identifies as being

BUENA.FETILUNA.MONTERO.FRANCISCO.MORRE.JESENA.KUIZON.TUICO.TECSONK | BSN 2C
involved with their healthcare or health - Auditing functions
care bills, unless the patient objects. - Administrative functions
- Research
● Without the patient’s authorization, healthcare - Public health reporting
providers generally cannot: - Criminal law requirements
○ Give information to the patient’s Professional Education
employer. - The need for professional education permits
○ Use or share the patient’s information information regarding in-house patients to be
for marketing or advertising purposes. exchanged for these purposes:
○ Share private notes about the patient’s - Medicine
mental health counselling sessions. - Nursing
- Allied Health
● Patient’s rights - Psychology
○ Right to see and get a copy of your - Social Services
health records. Research
○ Right to have corrections added to - Data in regard to the conducting or research
your medical records. can be shared to all researchers involved.
○ Right to receive a notice as to how - Hospitals that permit their staff to engage in
your health information may be used research have research committees to screen
or shared. the protocols.
○ Right to a report on how and why your International Review Boards (IRBs)
health information was shared. - An administrative body established to protect
○ Right to due process if your rights the rights and welfare of human research
were denied. subjects recruited to participate in research
○ Right to decide if you want to give activities conducted under the auspices of the
permission before your health institution with which it is affiliated.
information may be used or shared. - Attempts to balance the potential risk to the
patient against the potential benefits of the
V. LEGITIMATE INTEREST research.
Legitimate interest Research standards:
- is a standard to determine whether an 1. The results should be presented in such a
enforcing party has a protectible, valid, and fashion as to protect the anonymity of the
legal interest that allows them to create some patients.
type of restriction or perform a specific action. 2. Only those involved in the study will have
Medical record: access to the raw data.
- Medical information about the patient’s 3. Safeguards to protect the patient's privacy will
condition be part of the research protocol.
- Contains patient’s personal data 4. Patient confidentiality should be maintained in
- Patient’s financial and social nature the conduct of medical research.
- A property of the hospital or clinic
- Patient has legal interests and rights to the Health records and legitimate access
information
Access to the medical record is limited to: Level 1 - direct ● Physicians
- Patient patient care ● Nurses
● Institutional services
- Authorized representatives of the patient
● Therapists/Technologists
- Attending physician
- Hospital staff members who have a legitimate Level 2 - ● Service payers
interest supportive ● Risk management
● Quality care reviews
Grounds of legitimate interest: services
- Professional education
Level 3 - Social ● Insurance
- Patient care services ● Licensing

BUENA.FETILUNA.MONTERO.FRANCISCO.MORRE.JESENA.KUIZON.TUICO.TECSONK | BSN 2C
● Employment decisions
Basic Principles of Human Subject Research
● Civil/criminal judicial review
● Public health reporting ● AUTONOMY
● Research
● Education - First consideration is that subjects are
● Media individual autonomous agents and
● Law enforcement have the right to expect that the
● Rehabilitation
researcher will support their opinions
and choices while refraining from
Documentation obstructing their actions unless they
- A material that provides official information or are clearly detrimental to others. This
evidence or that serves as a record. is applied through the use of Informed
- The less confidential information written Consent.
explicitly into the record, the fewer - Second consideration deals with the
opportunities there are for harmful disclosures fact that not all individuals are capable
involving patient privacy. of self determination. For individuals
- It is essential and required by law that who have either not gained the
hospitals establish procedures to protect the capacity for self-determination or have
content of medical records. lost this capacity due to illness, mental
- This is not only in the standpoint of disability, or circumstances that
patient confidentiality, but also against severely restrict liberty, special
the possibility of intentional considerations need to be put in place
falsification and alteration of record. to ensure their protection, even if this
means excluding them from
VI. HUMAN SUBJECT RESEARCH participation in the research.

What is Human Subject Research? ● BENEFICENCE & NON-MALEFICENCE


- Research projects generally are described in - Patient benefit and risk calculations
a protocol that sets forth the explicit objectives should always be considered in
and formal procedures designed to reach human research. Every effort should
these objectives. be made to secure for all participants
their well-being. Two general rules that
Objectives of Human Subject Research have been formulated to extend these
1. Gaining understanding of normal and activities are (1) do no harm, and (2)
abnormal physiological, psychological, and maximize possible benefits and
sociological phenomena minimize possible harm.
2. Evaluating the efficacy of diagnostic,
therapeutic, or preventive interventions and ● CONFIDENTIALITY
variations in service or practice. - Privacy refers to “persons and to their
interest in controlling the access of
Methods to Reach the Objectives of Human others to themselves,” and no
Subject Research participant should ever be forced to
● Invasive and Non-invasive procedures reveal information to the researcher
● Collection of body tissues and fluids that the participant does not wish to
● Administration of chemical substances reveal.
● Randomization of subjects - Depending on the type of study,
● Modification of diet or daily routine personal identifiers such as names,
● Orchestration of strenuous physical exercise birthdates, places of residence etc.
● Alteration of environment may or may not have to be collected.
● Administration of questionnaires
● Reviews of Records

BUENA.FETILUNA.MONTERO.FRANCISCO.MORRE.JESENA.KUIZON.TUICO.TECSONK | BSN 2C
● JUSTICE 6. There will be adequate provision for the protection
- Research supported by public funds of privacy and the maintenance of confidentiality of
that leads to improvement of collected data.
technologies or therapies should
benefit more than those who can
afford them and that the research VII. INSTITUTIONAL REVIEW BOARDS
should not depend unduly on
populations unlikely to be among the Institutional Review Boards
beneficiaries of the applications of ● To ensure satisfactory compliance with
research findings appropriate research standards, institutions
create institutional review boards
Professional and Ethical Standards to be followed ● To review the research protocols prior to
in Human Subject Research implementation.
● One of the important activities gathered under
1. Risks the subjects are minimized by using the aegis role of duty is service on IRB.
procedures consistent with sound research design ● These boards are established to protect the
that do not unnecessarily expose subjects to risk. rights and welfare of human subjects recruited
Whenever appropriate, the research will use to participate in research activities under the
procedures already being performed on the subjects auspices of the institution with which a board
for diagnostic or treatment purposes is affiliated.

2. Risks to subjects are reasonable in relation to Research


anticipated benefits, if any, to them, and the - A systematic investigation, including research
importance of the knowledge that may reasonably be development, testing, and evaluation,
expected to result. Researchers should consider only designed to develop or contribute to
risks and benefits that may result from the research generalizable knowledge.
(as distinguished from risks and benefits of therapies
subjects would receive if they were not participating in Human Subjects
the research.) researchers should not consider the - Living individuals about whom an investigator
long range effects of applying knowledge gained in (whether professional or student) conducting
the research (e.g., the possible effects of the research research obtains:
on public policy) as among those research risks that ● Data through intervention or interaction with
fall within the purview of their responsibilities. the individual
● Identifiable private information
3. Selection of subjects is equitable. In making this Code and Documents (end of World War II)
assessment, the researcher should take into account 1. Nuremberg Code of 1947
the purposes of the research and the setting in which - August 1947, in Nuremberg, Germany
the research will be conducted. The researcher also - The Nuremberg Code aimed to protect
should be particularly cognizant of the special human subjects from enduring the
problems of research involving vulnerable kind of cruelty and exploitation the
populations, such as children, prisoners, pregnant prisoners endured at concentration
women, mentally disabled persons, or economically camps.
or educationally disadvantaged persons. The 10 elements of the code are:
● Voluntary consent is essential
4. Informed consent will be sought and appropriately
● The results of any experiment must be for the
documented from the subject or the subject’s legal
greater good of society
representative, in accordance with the requirements
● Human experiments should be based on
of law and ethical practice.
previous animal experimentation
● Experiments should be conducted by avoiding
5. There will be appropriate provision for monitoring
physical/mental suffering and injury
the data collected to ensure the safety of subjects.
● No experiments should be conducted if it is
believed to cause death/disability

BUENA.FETILUNA.MONTERO.FRANCISCO.MORRE.JESENA.KUIZON.TUICO.TECSONK | BSN 2C
● The risks should never exceed the benefits Howard, the Belmont Report allows for
● Adequate facilities should be used to protect a positive solution, which at times may
subjects be difficult to find, to future subjects
● Experiments should be conducted only by who are not capable to make
qualified scientists independent decisions
● Subjects should be able to end their 4. U.S. Department of Health and Human
participation at any time Services Title 45 of 2001
● The scientist in charge must be prepared to - Laws set by the U.S. Department of
terminate the experiment when injury, Health and Human Services (DHHS)
disability, or death is likely to occur to protect a person from risks in
research studies that any federal
agency or department has a part in.
2. Helsinki Declaration of 1964 (with later Also called 45 Code of Federal
revisions) Regulations Part 46, human
- Formal statement of ethical principles participant protection regulations, and
published by the World Medical Protection of Human Subjects.
Association (WMA) to guide the - In the United States, the Code of
protection of human participants in Federal Regulations Title 45: Public
medical research. Welfare, part 46 (45 CFR 46) provides
- Adopted in 1964 by the 18th WMA protection for human subjects in
General Assembly, at Helsinki research carried out or supported by
most federal departments and
● 1975 (first revision) agencies. 45 CFR 46 created a
● 1983 (second revision) common federal policy for the
● 1989 (third revision) protection of such human subjects that
● 1996 (fourth revision) was accepted by the Office of Science
● 2000 (fifth revision) and Technology Policy and issued by
● 2008 (sixth revision) each of the departments and agencies
● 2013 (seventh revision) listed in the document. The code is
3. Belmont Report of 1979 divided into four subparts: basic
- The report was issued on 30 protection applicable to all human
September 1978and published in the research subjects; additional
Federal Register on 18 April 1979. protections for women, human
- The three basic ethical principles fetuses, and neonates; additional
identified and set forth as guidelines protections for prisoners; and
for the conduct of biomedical and additional protections for children.
behavioral research involving human Although 45 CFR 46 contains
subjects - respect for persons, additional protections for human
beneficence, and justice - remain fetuses, it is important to note that
particularly relevant and necessary for these protections last only from
today’s clinical trials. implantation to birth, and are not
- The Belmont Report summarizes extended to embryos before
ethical principles and guidelines for implantation.
research involving human subjects. 5. American Psychological Association Code
Three core principles are identified: for conduct of social and behavioral
respect for persons, beneficence, and research
justice. Three primary areas of - Includes an introduction, preamble, a
application are also stated. They are list of five aspirational principles and a
informed consent, assessment of risks list of ten enforceable standards that
and benefits, and selection of psychologists use to guide ethical
subjects. According to Vollmer and

BUENA.FETILUNA.MONTERO.FRANCISCO.MORRE.JESENA.KUIZON.TUICO.TECSONK | BSN 2C
decisions in practice, research, and
education.
Five principles for research ethics
● PRINCIPLE A:
COMPETENCE
● PRINCIPLE B: INTEGRITY
● PRINCIPLE C:
PROFESSIONAL AND
SCIENTIFIC
RESPONSIBILITY
● PRINCIPLE D: RESPECT
FOR PEOPLE'S RIGHTS
AND DIGNITY
● PRINCIPLE E: CONCERN
FOR OTHERS' WELFARE
● PRINCIPLE F: SOCIAL
RESPONSIBILITY
If psychologists’ ethical responsibilities conflict with
law, regulations, or other governing legal authority,
psychologists make known their commitment to this
Ethics Code and take steps to resolve the conflict in a
responsible manner in keeping with basic principles of
human rights.

In addition:
A fundamental principle of nursing practice is respect
for the inherent dignity, worth, unique attributes, and
human rights of all individuals.1 Nurses who
understand legal and ethical protections for human
subjects can contribute to research by serving as
advocates for their patients and helping to ensure that
studies are conducted in an ethical, legal, and
scientifically valid manner.

BUENA.FETILUNA.MONTERO.FRANCISCO.MORRE.JESENA.KUIZON.TUICO.TECSONK | BSN 2C
DATA PRIVACY ACT OF 2012
CHAPTER 1
GENERAL PROVISIONS (e) Filing system refers to any act of
information relating to natural or juridical
SECTION 1. Short Title. – This Act shall persons to the extent that, although the
be known as the “Data Privacy Act of information is not processed by equipment
2012”. operating automatically in response to
instructions given for that purpose, the set
SEC. 2. Declaration of Policy. – It is the is structured, either by reference to
policy of the State to protect the individuals or by reference to criteria
fundamental human right of privacy, of relating to individuals, in such a way that
communication while ensuring free flow of specific information relating to a particular
information to promote innovation and person is readily accessible.
growth. The State recognizes the vital role
of information and communications (f) Information and Communications
technology in nation-building and its System refers to a system for generating,
inherent obligation to ensure that personal sending, receiving, storing or otherwise
information in information and processing electronic data messages or
communications systems in the electronic documents and includes the
government and in the private sector are computer system or other similar device
secured and protected. by or which data is recorded, transmitted
or stored and any procedure related to the
SEC. 3. Definition of Terms. – Whenever recording, transmission or storage of
used in this Act, the following terms shall electronic data, electronic message, or
have the respective meanings hereafter electronic document.
set forth:
(g) Personal information refers to any
(a) Commission shall refer to the National information whether recorded in a material
Privacy Commission created by virtue of form or not, from which the identity of an
this Act. individual is apparent or can be
reasonably and directly ascertained by the
(b) Consent of the data subject refers to
entity holding the information, or when put
any freely given, specific, informed
together with other information would
indication of will, whereby the data subject
directly and certainly identify an individual.
agrees to the collection and processing of
personal information about and/or relating (h) Personal information controller refers
to him or her. Consent shall be evidenced to a person or organization who controls
by written, electronic or recorded means. It the collection, holding, processing or use
may also be given on behalf of the data of personal information, including a person
subject by an agent specifically authorized or organization who instructs another
by the data subject to do so. person or organization to collect, hold,
process, use, transfer or disclose personal
(c) Data subject refers to an individual
information on his or her behalf. The term
whose personal information is processed.
excludes:
(d) Direct marketing refers to
(1) A person or organization who performs
communication by whatever means of any
such functions as instructed by another
advertising or marketing material which is
person or organization; and
directed to particular individuals.
(2) An individual who collects, holds, (4) Specifically established by an
processes or uses personal information in executive order or an act of Congress to
connection with the individual’s personal, be kept classified.
family or household affairs.
SEC. 4. Scope. – This Act applies to the
(i) Personal information processor refers processing of all types of personal
to any natural or juridical person qualified information and to any natural and juridical
to act as such under this Act to whom a person involved in personal information
personal information controller may processing including those personal
outsource the processing of personal data information controllers and processors
pertaining to a data subject. who, although not found or established in
the Philippines, use equipment that are
(j) Processing refers to any operation or located in the Philippines, or those who
any set of operations performed upon maintain an office, branch or agency in the
personal information including, but not Philippines subject to the immediately
limited to, the collection, recording, succeeding paragraph: Provided, That the
organization, storage, updating or requirements of Section 5 are complied
modification, retrieval, consultation, use, with.
consolidation, blocking, erasure or
destruction of data. This Act does not apply to the following:

(k) Privileged information refers to any and (a) Information about any individual who is
all forms of data which under the Rules of or was an officer or employee of a
Court and other pertinent laws constitute government institution that relates to the
privileged communication. position or functions of the individual,
including:
(l) Sensitive personal information refers to
personal information: (1) The fact that the individual is or was an
officer or employee of the government
(1) About an individual’s race, ethnic institution;
origin, marital status, age, color, and
religious, philosophical or political (2) The title, business address and office
affiliations; telephone number of the individual;

(2) About an individual’s health, education, (3) The classification, salary range and
genetic or sexual life of a person, or to any responsibilities of the position held by the
proceeding for any offense committed or individual; and
alleged to have been committed by such
person, the disposal of such proceedings, (4) The name of the individual on a
or the sentence of any court in such document prepared by the individual in the
proceedings; course of employment with the
government;
(3) Issued by government agencies
peculiar to an individual which includes, (b) Information about an individual who is
but not limited to, social security numbers, or was performing service under contract
previous or current health records, for a government institution that relates to
licenses or its denials, suspension or the services performed, including the
revocation, and tax returns; and terms of the contract, and the name of the
individual given in the course of the SEC. 5. Protection Afforded to Journalists
performance of those services; and Their Sources. – Nothing in this Act
shall be construed as to have amended or
(c) Information relating to any repealed the provisions of Republic Act
discretionary benefit of a financial nature No. 53, which affords the publishers,
such as the granting of a license or permit editors or duly accredited reporters of any
given by the government to an individual, newspaper, magazine or periodical of
including the name of the individual and general circulation protection from being
the exact nature of the benefit; compelled to reveal the source of any
news report or information appearing in
(d) Personal information processed for said publication which was related in any
journalistic, artistic, literary or research confidence to such publisher, editor, or
purposes; reporter.
(e) Information necessary in order to carry SEC. 6. Extraterritorial Application. – This
out the functions of public authority which Act applies to an act done or practice
includes the processing of personal data engaged in and outside of the Philippines
for the performance by the independent, by an entity if:
central monetary authority and law
enforcement and regulatory agencies of (a) The act, practice or processing relates
their constitutionally and statutorily to personal information about a Philippine
mandated functions. Nothing in this Act citizen or a resident;
shall be construed as to have amended or
repealed Republic Act No. 1405, (b) The entity has a link with the
otherwise known as the Secrecy of Bank Philippines, and the entity is processing
Deposits Act; Republic Act No. 6426, personal information in the Philippines or
otherwise known as the Foreign Currency even if the processing is outside the
Deposit Act; and Republic Act No. 9510, Philippines as long as it is about Philippine
otherwise known as the Credit Information citizens or residents such as, but not
System Act (CISA); limited to, the following:

(f) Information necessary for banks and (1) A contract is entered in the Philippines;
other financial institutions under the
jurisdiction of the independent, central (2) A juridical entity unincorporated in the
monetary authority or Bangko Sentral ng Philippines but has central management
Pilipinas to comply with Republic Act No. and control in the country; and
9510, and Republic Act No. 9160, as
amended, otherwise known as the (3) An entity that has a branch, agency,
Anti-Money Laundering Act and other office or subsidiary in the Philippines and
applicable laws; and the parent or affiliate of the Philippine
entity has access to personal information;
(g) Personal information originally and
collected from residents of foreign
jurisdictions in accordance with the laws of (c) The entity has other links in the
those foreign jurisdictions, including any Philippines such as, but not limited to:
applicable data privacy laws, which is
(1) The entity carries on business in the
being processed in the Philippines.
Philippines; and
(2) The personal information was collected (d) Compel or petition any entity,
or held by an entity in the Philippines. government agency or instrumentality to
abide by its orders or take action on a
CHAPTER II matter affecting data privacy;

THE NATIONAL PRIVACY COMMISSION (e) Monitor the compliance of other


government agencies or instrumentalities
SEC. 7. Functions of the National Privacy on their security and technical measures
Commission. – To administer and and recommend the necessary action in
implement the provisions of this Act, and order to meet minimum standards for
to monitor and ensure compliance of the protection of personal information
country with international standards set for pursuant to this Act;
data protection, there is hereby created an
independent body to be known as the (f) Coordinate with other government
National Privacy Commission, winch shall agencies and the private sector on efforts
have the following functions: to formulate and implement plans and
policies to strengthen the protection of
(a) Ensure compliance of personal personal information in the country;
information controllers with the provisions
of this Act; (g) Publish on a regular basis a guide to
all laws relating to data protection;
(b) Receive complaints, institute
investigations, facilitate or enable (h) Publish a compilation of agency
settlement of complaints through the use system of records and notices, including
of alternative dispute resolution index and other finding aids;
processes, adjudicate, award indemnity on
matters affecting any personal information, (i) Recommend to the Department of
prepare reports on disposition of Justice (DOJ) the prosecution and
complaints and resolution of any imposition of penalties specified in
investigation it initiates, and, in cases it Sections 25 to 29 of this Act;
deems appropriate, publicize any such
report: Provided, That in resolving any (j) Review, approve, reject or require
complaint or investigation (except where modification of privacy codes voluntarily
amicable settlement is reached by the adhered to by personal information
parties), the Commission shall act as a controllers:Provided, That the privacy
collegial body. For this purpose, the codes shall adhere to the underlying data
Commission may be given access to privacy principles embodied in this Act:
personal information that is subject of any Provided, further,That such privacy codes
complaint and to collect the information may include private dispute resolution
necessary to perform its functions under mechanisms for complaints against any
this Act; participating personal information
controller. For this purpose, the
(c) Issue cease and desist orders, impose Commission shall consult with relevant
a temporary or permanent ban on the regulatory agencies in the formulation and
processing of personal information, upon administration of privacy codes applying
finding that the processing will be the standards set out in this Act, with
detrimental to national security and public respect to the persons, entities, business
interest; activities and business sectors that said
regulatory bodies are authorized to
principally regulate pursuant to the law: SEC. 9. Organizational Structure of the
Provided, finally. That the Commission Commission. – The Commission shall be
may review such privacy codes and attached to the Department of Information
require changes thereto for purposes of and Communications Technology (DICT)
complying with this Act; and shall be headed by a Privacy
Commissioner, who shall also act as
(k) Provide assistance on matters relating Chairman of the Commission. The Privacy
to privacy or data protection at the request Commissioner shall be assisted by two (2)
of a national or local agency, a private Deputy Privacy Commissioners, one to be
entity or any person; responsible for Data Processing Systems
and one to be responsible for Policies and
(l) Comment on the implication on data Planning. The Privacy Commissioner and
privacy of proposed national or local the two (2) Deputy Privacy Commissioners
statutes, regulations or procedures, issue shall be appointed by the President of the
advisory opinions and interpret the Philippines for a term of three (3) years,
provisions of this Act and other data and may be reappointed for another term
privacy laws; of three (3) years. Vacancies in the
Commission shall be filled in the same
(m) Propose legislation, amendments or
manner in which the original appointment
modifications to Philippine laws on privacy
was made.
or data protection as may be necessary;
The Privacy Commissioner must be at
(n) Ensure proper and effective
least thirty-five (35) years of age and of
coordination with data privacy regulators
good moral character, unquestionable
in other countries and private
integrity and known probity, and a
accountability agents, participate in
recognized expert in the field of
international and regional initiatives for
information technology and data privacy.
data privacy protection;
The Privacy Commissioner shall enjoy the
(o) Negotiate and contract with other data benefits, privileges and emoluments
privacy authorities of other countries for equivalent to the rank of Secretary.
cross-border application and
The Deputy Privacy Commissioners must
implementation of respective privacy laws;
be recognized experts in the field of
(p) Assist Philippine companies doing information and communications
business abroad to respond to foreign technology and data privacy. They shall
privacy or data protection laws and enjoy the benefits, privileges and
regulations; and emoluments equivalent to the rank of
Undersecretary.
(q) Generally perform such acts as may be
necessary to facilitate cross-border The Privacy Commissioner, the Deputy
enforcement of data privacy protection. Commissioners, or any person acting on
their behalf or under their direction, shall
SEC. 8. Confidentiality. – The Commission not be civilly liable for acts done in good
shall ensure at all times the confidentiality faith in the performance of their duties.
of any personal information that comes to However, he or she shall be liable for
its knowledge and possession. willful or negligent acts done by him or her
which are contrary to law, morals, public
policy and good customs even if he or she
acted under orders or instructions of compatible with such declared, specified
superiors: Provided, That in case a lawsuit and legitimate purposes only;
is filed against such official on the subject
of the performance of his or her duties, (b) Processed fairly and lawfully;
where such performance is lawful, he or
she shall be reimbursed by the (c) Accurate, relevant and, where
Commission for reasonable costs of necessary for purposes for which it is to
litigation. be used the processing of personal
information, kept up to date; inaccurate or
SEC. 10. The Secretariat. – The incomplete data must be rectified,
Commission is hereby authorized to supplemented, destroyed or their further
establish a Secretariat. Majority of the processing restricted;
members of the Secretariat must have
served for at least five (5) years in any (d) Adequate and not excessive in relation
agency of the government that is involved to the purposes for which they are
in the processing of personal information collected and processed;
including, but not limited to, the following
(e) Retained only for as long as necessary
offices: Social Security System (SSS),
for the fulfillment of the purposes for which
Government Service Insurance System
the data was obtained or for the
(GSIS), Land Transportation Office (LTO),
establishment, exercise or defense of
Bureau of Internal Revenue (BIR),
legal claims, or for legitimate business
Philippine Health Insurance Corporation
purposes, or as provided by law; and
(PhilHealth), Commission on Elections
(COMELEC), Department of Foreign (f) Kept in a form which permits
Affairs (DFA), Department of Justice identification of data subjects for no longer
(DOJ), and Philippine Postal Corporation than is necessary for the purposes for
(Philpost). which the data were collected and
processed: Provided, That personal
CHAPTER III
information collected for other purposes
PROCESSING OF PERSONAL may lie processed for historical, statistical
INFORMATION or scientific purposes, and in cases laid
down in law may be stored for longer
SEC. 11. General Data Privacy Principles. periods: Provided, further,That adequate
– The processing of personal information safeguards are guaranteed by said laws
shall be allowed, subject to compliance authorizing their processing.
with the requirements of this Act and other
laws allowing disclosure of information to The personal information controller must
the public and adherence to the principles ensure implementation of personal
of transparency, legitimate purpose and information processing principles set out
proportionality. herein.

Personal information must, be:, SEC. 12. Criteria for Lawful Processing of
Personal Information. – The processing of
(a) Collected for specified and legitimate personal information shall be permitted
purposes determined and declared before, only if not otherwise prohibited by law, and
or as soon as reasonably practicable after when at least one of the following
collection, and later processed in a way conditions exists:
(a) The data subject has given his or her have given their consent prior to
consent; processing;

(b) The processing of personal information (b) The processing of the same is
is necessary and is related to the provided for by existing laws and
fulfillment of a contract with the data regulations: Provided, That such
subject or in order to take steps at the regulatory enactments guarantee the
request of the data subject prior to protection of the sensitive personal
entering into a contract; information and the privileged information:
Provided, further, That the consent of the
(c) The processing is necessary for data subjects are not required by law or
compliance with a legal obligation to which regulation permitting the processing of the
the personal information controller is sensitive personal information or the
subject; privileged information;

(d) The processing is necessary to protect (c) The processing is necessary to protect
vitally important interests of the data the life and health of the data subject or
subject, including life and health; another person, and the data subject is
not legally or physically able to express his
(e) The processing is necessary in order or her consent prior to the processing;
to respond to national emergency, to
comply with the requirements of public (d) The processing is necessary to
order and safety, or to fulfill functions of achieve the lawful and noncommercial
public authority which necessarily includes objectives of public organizations and their
the processing of personal data for the associations: Provided, That such
fulfillment of its mandate; or processing is only confined and related to
the bona fide members of these
(f) The processing is necessary for the organizations or their associations:
purposes of the legitimate interests Provided, further, That the sensitive
pursued by the personal information personal information are not transferred to
controller or by a third party or parties to third parties: Provided, finally, That
whom the data is disclosed, except where consent of the data subject was obtained
such interests are overridden by prior to processing;
fundamental rights and freedoms of the
data subject which require protection (e) The processing is necessary for
under the Philippine Constitution. purposes of medical treatment, is carried
out by a medical practitioner or a medical
SEC. 13. Sensitive Personal Information treatment institution, and an adequate
and Privileged Information. – The level of protection of personal information
processing of sensitive personal is ensured; or
information and privileged information
shall be prohibited, except in the following (f) The processing concerns such personal
cases: information as is necessary for the
protection of lawful rights and interests of
(a) The data subject has given his or her natural or legal persons in court
consent, specific to the purpose prior to proceedings, or the establishment,
the processing, or in the case of privileged exercise or defense of legal claims, or
information, all parties to the exchange
when provided to government or public and other laws for processing of personal
authority. information. The personal information
processor shall comply with all the
SEC. 14. Subcontract of Personal requirements of this Act and other
Information. – A personal information applicable laws.
controller may subcontract the processing
of personal information: Provided, That the SEC. 15. Extension of Privileged
personal information controller shall be Communication. – Personal information
responsible for ensuring that proper controllers may invoke the principle of
safeguards are in place to ensure the privileged communication over privileged
confidentiality of the personal information information that they lawfully control or
processed, prevent its use for process. Subject to existing laws and
unauthorized purposes, and generally, regulations, any evidence gathered on
comply with the requirements of this Act privileged information is inadmissible.

CHAPTER IV

RIGHTS OF THE DATA SUBJECT

SEC. 16. Rights of the Data Subject. – and the extent to which such access is
The data subject is entitled to: authorized;

(a) Be informed whether personal (6) The identity and contact details of the
information pertaining to him or her shall personal information controller or its
be, are being or have been processed; representative;

(b) Be furnished the information indicated (7) The period for which the information
hereunder before the entry of his or her will be stored; and
personal information into the processing
system of the personal information (8) The existence of their rights, i.e., to
controller, or at the next practical access, correction, as well as the right to
opportunity: lodge a complaint before the Commission.

(1) Description of the personal information Any information supplied or declaration


to be entered into the system; made to the data subject on these matters
shall not be amended without prior
(2) Purposes for which they are being or notification of data subject: Provided, That
are to be processed; the notification under subsection (b) shall
not apply should the personal information
(3) Scope and method of the personal be needed pursuant to a subpoena or
information processing; when the collection and processing are for
obvious purposes, including when it is
(4) The recipients or classes of recipients necessary for the performance of or in
to whom they are or may be disclosed; relation to a contract or service or when
necessary or desirable in the context of an
(5) Methods utilized for automated access,
employer-employee relationship, between
if the same is allowed by the data subject,
the collector and the data subject, or when
the information is being collected and its inaccuracy and its rectification upon
processed as a result of legal obligation; reasonable request of the data subject;

(c) Reasonable access to, upon demand, (e) Suspend, withdraw or order the
the following: blocking, removal or destruction of his or
her personal information from the personal
(1) Contents of his or her personal information controller’s filing system upon
information that were processed; discovery and substantial proof that the
personal information are incomplete,
(2) Sources from which personal outdated, false, unlawfully obtained, used
information were obtained; for unauthorized purposes or are no
longer necessary for the purposes for
(3) Names and addresses of recipients of
which they were collected. In this case,
the personal information;
the personal information controller may
(4) Manner by which such data were notify third parties who have previously
processed; received such processed personal
information; and
(5) Reasons for the disclosure of the
personal information to recipients; (f) Be indemnified for any damages
sustained due to such inaccurate,
(6) Information on automated processes incomplete, outdated, false, unlawfully
where the data will or likely to be made as obtained or unauthorized use of personal
the sole basis for any decision significantly information.
affecting or will affect the data subject;

(7) Date when his or her personal


information concerning the data subject
were last accessed and modified; and SEC. 17. Transmissibility of Rights of the
Data Subject. – The lawful heirs and
(8) The designation, or name or identity assigns of the data subject may invoke the
and address of the personal information rights of the data subject for, which he or
controller; she is an heir or assignee at any time after
the death of the data subject or when the
(d) Dispute the inaccuracy or error in the data subject is incapacitated or incapable
personal information and have the of exercising the rights as enumerated in
personal information controller correct it the immediately preceding section.
immediately and accordingly, unless the
request is vexatious or otherwise SEC. 18. Right to Data Portability. – The
unreasonable. If the personal information data subject shall have the right, where
have been corrected, the personal personal information is processed by
information controller shall ensure the electronic means and in a structured and
accessibility of both the new and the commonly used format, to obtain from the
retracted information and the personal information controller a copy of
simultaneous receipt of the new and the data undergoing processing in an
retracted information by recipients thereof: electronic or structured format, which is
Provided, That the third parties who have commonly used and allows for further use
previously received such processed by the data subject. The Commission may
personal information shall he informed of specify the electronic format referred to
above, as well as the technical standards, personal information to be protected, the
modalities and procedures for their risks represented by the processing, the
transfer. size of the organization and complexity of
its operations, current data privacy best
SEC. 19. Non-Applicability. – The practices and the cost of security
immediately preceding sections are not implementation. Subject to guidelines as
applicable if the processed personal the Commission may issue from time to
information are used only for the needs of time, the measures implemented must
scientific and statistical research and, on include:
the basis of such, no activities are carried
out and no decisions are taken regarding (1) Safeguards to protect its computer
the data subject: Provided, That the network against accidental, unlawful or
personal information shall be held under unauthorized usage or interference with or
strict confidentiality and shall be used only hindering of their functioning or
for the declared purpose. Likewise, the availability;
immediately preceding sections are not
applicable to processing of personal (2) A security policy with respect to the
information gathered for the purpose of processing of personal information;
investigations in relation to any criminal,
administrative or tax liabilities of a data (3) A process for identifying and accessing
subject. reasonably foreseeable vulnerabilities in
its computer networks, and for taking
CHAPTER V preventive, corrective and mitigating
action against security incidents that can
SECURITY OF PERSONAL lead to a security breach; and
INFORMATION
(4) Regular monitoring for security
SEC. 20. Security of Personal Information. breaches and a process for taking
– (a) The personal information controller preventive, corrective and mitigating
must implement reasonable and action against security incidents that can
appropriate organizational, physical and lead to a security breach.
technical measures intended for the
protection of personal information against (d) The personal information controller
any accidental or unlawful destruction, must further ensure that third parties
alteration and disclosure, as well as processing personal information on its
against any other unlawful processing. behalf shall implement the security
measures required by this provision.
(b) The personal information controller
shall implement reasonable and (e) The employees, agents or
appropriate measures to protect personal representatives of a personal information
information against natural dangers such controller who are involved in the
as accidental loss or destruction, and processing of personal information shall
human dangers such as unlawful access, operate and hold personal information
fraudulent misuse, unlawful destruction, under strict confidentiality if the personal
alteration and contamination. information are not intended for public
disclosure. This obligation shall continue
(c) The determination of the appropriate even after leaving the public service,
level of security under this section must transfer to another position or upon
take into account the nature of the
termination of employment or contractual SEC. 21. Principle of Accountability. –
relations. Each personal information controller is
responsible for personal information under
(f) The personal information controller its control or custody, including information
shall promptly notify the Commission and that have been transferred to a third party
affected data subjects when sensitive for processing, whether domestically or
personal information or other information internationally, subject to cross-border
that may, under the circumstances, be arrangement and cooperation.
used to enable identity fraud are
reasonably believed to have been (a) The personal information controller is
acquired by an unauthorized person, and accountable for complying with the
the personal information controller or the requirements of this Act and shall use
Commission believes (bat such contractual or other reasonable means to
unauthorized acquisition is likely to give provide a comparable level of protection
rise to a real risk of serious harm to any while the information are being processed
affected data subject. The notification shall by a third party.
at least describe the nature of the breach,
the sensitive personal information possibly (b) The personal information controller
involved, and the measures taken by the shall designate an individual or individuals
entity to address the breach. Notification who are accountable for the organization’s
may be delayed only to the extent compliance with this Act. The identity of
necessary to determine the scope of the the individual(s) so designated shall be
breach, to prevent further disclosures, or made known to any data subject upon
to restore reasonable integrity to the request.
information and communications system.
CHAPTER VII
(1) In evaluating if notification is
unwarranted, the Commission may take SECURITY OF SENSITIVE PERSONAL
into account compliance by the personal INFORMATION IN GOVERNMENT
information controller with this section and
SEC. 22. Responsibility of Heads of
existence of good faith in the acquisition of
Agencies. – All sensitive personal
personal information.
information maintained by the
(2) The Commission may exempt a government, its agencies and
personal information controller from instrumentalities shall be secured, as far
notification where, in its reasonable as practicable, with the use of the most
judgment, such notification would not be in appropriate standard recognized by the
the public interest or in the interests of the information and communications
affected data subjects. technology industry, and as recommended
by the Commission. The head of each
(3) The Commission may authorize government agency or instrumentality
postponement of notification where it may shall be responsible for complying with the
hinder the progress of a criminal security requirements mentioned herein
investigation related to a serious breach. while the Commission shall monitor the
compliance and may recommend the
CHAPTER VI necessary action in order to satisfy the
minimum standards.
ACCOUNTABILITY FOR TRANSFER OF
PERSONAL INFORMATION
SEC. 23. Requirements Relating to The requirements of this subsection shall
Access by Agency Personnel to Sensitive be implemented not later than six (6)
Personal Information. – (a) On-site and months after the date of the enactment of
Online Access – Except as may be this Act.
allowed through guidelines to be issued by
the Commission, no employee of the SEC. 24. Applicability to Government
government shall have access to sensitive Contractors. – In entering into any contract
personal information on government that may involve accessing or requiring
property or through online facilities unless sensitive personal information from one
the employee has received a security thousand (1,000) or more individuals, an
clearance from the head of the source agency shall require a contractor and its
agency. employees to register their personal
information processing system with the
(b) Off-site Access – Unless otherwise Commission in accordance with this Act
provided in guidelines to be issued by the and to comply with the other provisions of
Commission, sensitive personal this Act including the immediately
information maintained by an agency may preceding section, in the same manner as
not be transported or accessed from a agencies and government employees
location off government property unless a comply with such requirements.
request for such transportation or access
is submitted and approved by the head of
the agency in accordance with the
following guidelines:

(1) Deadline for Approval or Disapproval – CHAPTER VIII


In the case of any request submitted to
PENALTIES
the head of an agency, such head of the
agency shall approve or disapprove the SEC. 25. Unauthorized Processing of
request within two (2) business days after Personal Information and Sensitive
the date of submission of the request. In Personal Information. – (a) The
case there is no action by the head of the unauthorized processing of personal
agency, then such request is considered information shall be penalized by
disapproved; imprisonment ranging from one (1) year to
three (3) years and a fine of not less than
(2) Limitation to One thousand (1,000)
Five hundred thousand pesos
Records – If a request is approved, the
(Php500,000.00) but not more than Two
head of the agency shall limit the access
million pesos (Php2,000,000.00) shall be
to not more than one thousand (1,000)
imposed on persons who process
records at a time; and
personal information without the consent
(3) Encryption – Any technology used to of the data subject, or without being
store, transport or access sensitive authorized under this Act or any existing
personal information for purposes of law.
off-site access approved under this
(b) The unauthorized processing of
subsection shall be secured by the use of
personal sensitive information shall be
the most secure encryption standard
penalized by imprisonment ranging from
recognized by the Commission.
three (3) years to six (6) years and a fine
of not less than Five hundred thousand
pesos (Php500,000.00) but not more than personal information of an individual in its
Four million pesos (Php4,000,000.00) container for trash collection.
shall be imposed on persons who process
personal information without the consent (b) The improper disposal of sensitive
of the data subject, or without being personal information shall be penalized by
authorized under this Act or any existing imprisonment ranging from one (1) year to
law. three (3) years and a fine of not less than
One hundred thousand pesos
SEC. 26. Accessing Personal Information (Php100,000.00) but not more than One
and Sensitive Personal Information Due to million pesos (Php1,000,000.00) shall be
Negligence. – (a) Accessing personal imposed on persons who knowingly or
information due to negligence shall be negligently dispose, discard or abandon
penalized by imprisonment ranging from the personal information of an individual in
one (1) year to three (3) years and a fine an area accessible to the public or has
of not less than Five hundred thousand otherwise placed the personal information
pesos (Php500,000.00) but not more than of an individual in its container for trash
Two million pesos (Php2,000,000.00) shall collection.
be imposed on persons who, due to
negligence, provided access to personal SEC. 28. Processing of Personal
information without being authorized Information and Sensitive Personal
under this Act or any existing law. Information for Unauthorized Purposes. –
The processing of personal information for
(b) Accessing sensitive personal unauthorized purposes shall be penalized
information due to negligence shall be by imprisonment ranging from one (1) year
penalized by imprisonment ranging from and six (6) months to five (5) years and a
three (3) years to six (6) years and a fine fine of not less than Five hundred
of not less than Five hundred thousand thousand pesos (Php500,000.00) but not
pesos (Php500,000.00) but not more than more than One million pesos
Four million pesos (Php4,000,000.00) (Php1,000,000.00) shall be imposed on
shall be imposed on persons who, due to persons processing personal information
negligence, provided access to personal for purposes not authorized by the data
information without being authorized subject, or otherwise authorized under this
under this Act or any existing law. Act or under existing laws.

SEC. 27. Improper Disposal of Personal The processing of sensitive personal


Information and Sensitive Personal information for unauthorized purposes
Information. – (a) The improper disposal of shall be penalized by imprisonment
personal information shall be penalized by ranging from two (2) years to seven (7)
imprisonment ranging from six (6) months years and a fine of not less than Five
to two (2) years and a fine of not less than hundred thousand pesos (Php500,000.00)
One hundred thousand pesos but not more than Two million pesos
(Php100,000.00) but not more than Five (Php2,000,000.00) shall be imposed on
hundred thousand pesos (Php500,000.00) persons processing sensitive personal
shall be imposed on persons who information for purposes not authorized by
knowingly or negligently dispose, discard the data subject, or otherwise authorized
or abandon the personal information of an under this Act or under existing laws.
individual in an area accessible to the
public or has otherwise placed the
SEC. 29. Unauthorized Access or information not covered by the
Intentional Breach. – The penalty of immediately preceding section without the
imprisonment ranging from one (1) year to consent of the data subject, shall he
three (3) years and a fine of not less than subject to imprisonment ranging from one
Five hundred thousand pesos (1) year to three (3) years and a fine of not
(Php500,000.00) but not more than Two less than Five hundred thousand pesos
million pesos (Php2,000,000.00) shall be (Php500,000.00) but not more than One
imposed on persons who knowingly and million pesos (Php1,000,000.00).
unlawfully, or violating data confidentiality
and security data systems, breaks in any (b) Any personal information controller or
way into any system where personal and personal information processor or any of
sensitive personal information is stored. its officials, employees or agents, who
discloses to a third party sensitive
SEC. 30. Concealment of Security personal information not covered by the
Breaches Involving Sensitive Personal immediately preceding section without the
Information. – The penalty of consent of the data subject, shall be
imprisonment of one (1) year and six (6) subject to imprisonment ranging from
months to five (5) years and a fine of not three (3) years to five (5) years and a fine
less than Five hundred thousand pesos of not less than Five hundred thousand
(Php500,000.00) but not more than One pesos (Php500,000.00) but not more than
million pesos (Php1,000,000.00) shall be Two million pesos (Php2,000,000.00).
imposed on persons who, after having
knowledge of a security breach and of the SEC. 33. Combination or Series of Acts. –
obligation to notify the Commission Any combination or series of acts as
pursuant to Section 20(f), intentionally or defined in Sections 25 to 32 shall make
by omission conceals the fact of such the person subject to imprisonment
security breach. ranging from three (3) years to six (6)
years and a fine of not less than One
SEC. 31. Malicious Disclosure. – Any million pesos (Php1,000,000.00) but not
personal information controller or personal more than Five million pesos
information processor or any of its (Php5,000,000.00).
officials, employees or agents, who, with
malice or in bad faith, discloses SEC. 34. Extent of Liability. – If the
unwarranted or false information relative offender is a corporation, partnership or
to any personal information or personal any juridical person, the penalty shall be
sensitive information obtained by him or imposed upon the responsible officers, as
her, shall be subject to imprisonment the case may be, who participated in, or
ranging from one (1) year and six (6) by their gross negligence, allowed the
months to five (5) years and a fine of not commission of the crime. If the offender is
less than Five hundred thousand pesos a juridical person, the court may suspend
(Php500,000.00) but not more than One or revoke any of its rights under this Act. If
million pesos (Php1,000,000.00). the offender is an alien, he or she shall, in
addition to the penalties herein prescribed,
SEC. 32. Unauthorized Disclosure. – (a) be deported without further proceedings
Any personal information controller or after serving the penalties prescribed. If
personal information processor or any of the offender is a public official or
its officials, employees or agents, who employee and lie or she is found guilty of
discloses to a third party personal acts penalized under Sections 27 and 28
of this Act, he or she shall, in addition to President and Congress on its activities in
the penalties prescribed herein, suffer carrying out the provisions of this Act. The
perpetual or temporary absolute Commission shall undertake whatever
disqualification from office, as the case efforts it may determine to be necessary
may be. or appropriate to inform and educate the
public of data privacy, data protection and
SEC. 35. Large-Scale. – The maximum fair information rights and responsibilities.
penalty in the scale of penalties
respectively provided for the preceding SEC. 41. Appropriations Clause. – The
offenses shall be imposed when the Commission shall be provided with an
personal information of at least one initial appropriation of Twenty million
hundred (100) persons is harmed, affected pesos (Php20,000,000.00) to be drawn
or involved as the result of the above from the national government.
mentioned actions. Appropriations for the succeeding years
shall be included in the General
SEC. 36. Offense Committed by Public Appropriations Act. It shall likewise receive
Officer. – When the offender or the person Ten million pesos (Php10,000,000.00) per
responsible for the offense is a public year for five (5) years upon
officer as defined in the Administrative implementation of this Act drawn from the
Code of the Philippines in the exercise of national government.
his or her duties, an accessory penalty
consisting in the disqualification to occupy SEC. 42. Transitory Provision. – Existing
public office for a term double the term of industries, businesses and offices affected
criminal penalty imposed shall he applied. by the implementation of this Act shall be
given one (1) year transitory period from
SEC. 37. Restitution. – Restitution for any the effectivity of the IRR or such other
aggrieved party shall be governed by the period as may be determined by the
provisions of the New Civil Code. Commission, to comply with the
requirements of this Act.
CHAPTER IX
In case that the DICT has not yet been
MISCELLANEOUS PROVISIONS created by the time the law takes full force
and effect, the National Privacy
SEC. 38. Interpretation. – Any doubt in the
Commission shall be attached to the
interpretation of any provision of this Act
Office of the President.
shall be liberally interpreted in a manner
mindful of the rights and interests of the SEC. 43. Separability Clause. – If any
individual about whom personal provision or part hereof is held invalid or
information is processed. unconstitutional, the remainder of the law
or the provision not otherwise affected
SEC. 39. Implementing Rules and
shall remain valid and subsisting.
Regulations (IRR). – Within ninety (90)
days from the effectivity of this Act, the SEC. 44. Repealing Clause. – The
Commission shall promulgate the rules provision of Section 7 of Republic Act No.
and regulations to effectively implement 9372, otherwise known as the “Human
the provisions of this Act. Security Act of 2007”, is hereby amended.
Except as otherwise expressly provided in
SEC. 40. Reports and Information. – The
this Act, all other laws, decrees, executive
Commission shall annually report to the
orders, proclamations and administrative - Electronic health records (EHRs)
regulations or parts thereof inconsistent simplify patient information
herewith are hereby repealed or modified sharing; eliminating redundant
accordingly. testing and procedures and
reducing discomfort,
inconvenience, medical expenses
and risks.
SEC. 45. Effectivity Clause. – This Act - Using this technology, patients can
shall take effect fifteen (15) days after its immediately authorize access to
publication in at least two (2) national timely and relevant information that
newspapers of general circulation. is needed by their caregivers.
Benefits of technology 4. Efficient Care Coordination
1. Increased Patient Safety - Easy access to information
facilitates collaboration among
- Care providers that have
multiple care providers. This
implemented HIT and EHR
transparency helps to eliminate
systems have experienced
errors and risks, such as conflicting
significant safety improvements
prescriptions and treatments. Care
due to the real-time information
providers use monitoring
accessibility afforded to all
technology to trigger alerts when
stakeholders.
such discrepancies arise in
- Additionally, these technologies
patients’ electronic health records.
allow researchers to analyze
information with extraordinary 5. Faster Lab Results
detail and accuracy.
- Electronic health records allow
2. Improved Scheduling caregivers to retrieve patient
information faster than
- Many unforeseen and
conventional methods, facilitating
counterproductive circumstances
timely test scheduling and
may arise during a typical care
treatment.
provider workday, which is
- Furthermore, caregivers can
compounded when staffing
access test results as soon as they
shortages occur. To mitigate this
become available
risk, healthcare managers use a
technology called 6. Increased Patient Information
resource-demand management Accessibility
that analyzes caseload information
and staff availability. A similar - By law, citizens have the right to
technology, access their own medical
workforce-management solutions, information to check for, and
performs largely the same tasks, correct, errors and omissions.
while also helping managers - To this end, some care providers
control costs and service quality. offer patients online access to
their medical records.
3. Reduced Test and Procedure - This practice increases information
Redundancy transparency and in many cases
enables patients to more quickly 20-percent, reducing patient stay
find answers to their questions. times in those cases.
- Likewise, the National Center for
7. Enhanced Performance Analysis Policy Analysis reports that
facilities using HIT systems
- While EHRs greatly reduce drug reduce average patient stays
errors, some mistakes still occur. from 5.7 days to 5.5 days.
- Errors typically happen while - This effectiveness has led
administering,dispensing, researchers to explore other
prescribing or transcribing benefits to using electronic
medications. health records and HIT, such as
- Electronic information whether telemonitoring can
management allows caregivers delay nursing home
to identify areas for admittance among elderly patients.
improvement and increase
patient safety.

8.Streamlined Records Administration 10.Reduced Operational Costs

- Electronic health records replace - Cost reduction represents one


the paper charts historically criterion for satisfying the Triple
used during care provider Aim objective of the Agency
visits.-As more providers adopt for Health Research and Quality.
EHR technology, patients will be - Healthcare information
asked less frequently to fill out technology plays a key role in
information during visits, significantly reducing operational
because providers will already costs.
have current data on file. - Caregiving organizations that
- Furthermore, EHRs streamline the incorporate health information
traditional intake process, which technology often see significant
can sometimes seem excessive cost savings within the first year of
for relatively minor medical implementation.
needs. -
- EHRs also reduce errors by - CHAPTER VII
making current patient - SECURITY OF SENSITIVE
information immediately PERSONAL
accessible to all - INFORMATION IN
network-connected care providers. GOVERNMENT
- SEC. 22. Responsibility of Heads
9. Reduced Hospital Stays of Agencies. – All sensitive
personal information maintained by
- According to the Office of
the government, its agencies and
the National Coordinator (ONC)
instrumentalities shall be secured,
for Health Information
as far as practicable, with the use
Technology, electronic
of the most appropriate standard
record implementation
recognized by the information and
reduces the time needed to
communications technology
assess fall victims by
industry, and as recommended by
the Commission. The head of each - (2) Limitation to One thousand
government agency or (1,000) Records – If a request is
instrumentality shall be responsible approved, the head of the agency
for complying with the security shall limit the access to not more
requirements mentioned herein than one thousand (1,000) records
while the Commission shall at a time; and
monitor the compliance and may - (3) Encryption – Any technology
recommend the necessary action used to store, transport or access
in order to satisfy the minimum sensitive personal information for
standards. purposes of off-site access
- SEC. 23. Requirements Relating to approved under this subsection
Access by Agency Personnel to shall be secured by the use of the
Sensitive Personal Information. – most secure encryption standard
(a) On-site and Online Access – recognized by the Commission.
Except as may be allowed through - The requirements of this
guidelines to be issued by the subsection shall be implemented
Commission, no employee of the not later than six (6) months after
government shall have access to the date of the enactment of this
sensitive personal information on Act.
government property or through - SEC. 24. Applicability to
online facilities unless the Government Contractors. – In
employee has received a security entering into any contract that may
clearance from the head of the involve accessing or requiring
source agency. sensitive personal information from
- (b) Off-site Access – Unless one thousand (1,000) or more
otherwise provided in guidelines to individuals, an agency shall require
be issued by the Commission, a contractor and its employees to
sensitive personal information register their personal information
maintained by an agency may not processing system with the
be transported or accessed from a Commission in accordance with
location off government property this Act and to comply with the
unless a request for such other provisions of this Act
transportation or access is including the immediately
submitted and approved by the preceding section, in the same
head of the agency in accordance manner as agencies and
with the following guidelines: government employees comply
- (1) Deadline for Approval or with such requirements.
Disapproval – In the case of any - CHAPTER VIII
request submitted to the head of - PENALTIES
an agency, such head of the - SEC. 25. Unauthorized Processing
agency shall approve or of Personal Information and
disapprove the request within two Sensitive Personal Information. –
(2) business days after the date of (a) The unauthorized processing of
submission of the request. In case personal information shall be
there is no action by the head of penalized by imprisonment ranging
the agency, then such request is from one (1) year to three (3) years
considered disapproved; and a fine of not less than Five
hundred thousand pesos
(Php500,000.00) but not more than imposed on persons who, due to
Two million pesos negligence, provided access to
(Php2,000,000.00) shall be personal information without being
imposed on persons who process authorized under this Act or any
personal information without the existing law.
consent of the data subject, or - SEC. 27. Improper Disposal of
without being authorized under this Personal Information and Sensitive
Act or any existing law. Personal Information. – (a) The
- (b) The unauthorized processing of improper disposal of personal
personal sensitive information shall information shall be penalized by
be penalized by imprisonment imprisonment ranging from six (6)
ranging from three (3) years to six months to two (2) years and a fine
(6) years and a fine of not less of not less than One hundred
than Five hundred thousand pesos thousand pesos (Php100,000.00)
(Php500,000.00) but not more than but not more than Five hundred
Four million pesos thousand pesos (Php500,000.00)
(Php4,000,000.00) shall be shall be imposed on persons who
imposed on persons who process knowingly or negligently dispose,
personal information without the discard or abandon the personal
consent of the data subject, or information of an individual in an
without being authorized under this area accessible to the public or
Act or any existing law. has otherwise placed the personal
- SEC. 26. Accessing Personal information of an individual in its
Information and Sensitive Personal container for trash collection.
Information Due to Negligence. – - (b) The improper disposal of
(a) Accessing personal information sensitive personal information shall
due to negligence shall be be penalized by imprisonment
penalized by imprisonment ranging ranging from one (1) year to three
from one (1) year to three (3) years (3) years and a fine of not less
and a fine of not less than Five than One hundred thousand pesos
hundred thousand pesos (Php100,000.00) but not more than
(Php500,000.00) but not more than One million pesos
Two million pesos (Php1,000,000.00) shall be
(Php2,000,000.00) shall be imposed on persons who
imposed on persons who, due to knowingly or negligently dispose,
negligence, provided access to discard or abandon the personal
personal information without being information of an individual in an
authorized under this Act or any area accessible to the public or
existing law. has otherwise placed the personal
- (b) Accessing sensitive personal information of an individual in its
information due to negligence shall container for trash collection.
be penalized by imprisonment - SEC. 28. Processing of Personal
ranging from three (3) years to six Information and Sensitive Personal
(6) years and a fine of not less Information for Unauthorized
than Five hundred thousand pesos Purposes. – The processing of
(Php500,000.00) but not more than personal information for
Four million pesos unauthorized purposes shall be
(Php4,000,000.00) shall be penalized by imprisonment ranging
from one (1) year and six (6) Five hundred thousand pesos
months to five (5) years and a fine (Php500,000.00) but not more than
of not less than Five hundred One million pesos
thousand pesos (Php500,000.00) (Php1,000,000.00) shall be
but not more than One million imposed on persons who, after
pesos (Php1,000,000.00) shall be having knowledge of a security
imposed on persons processing breach and of the obligation to
personal information for purposes notify the Commission pursuant to
not authorized by the data subject, Section 20(f), intentionally or by
or otherwise authorized under this omission conceals the fact of such
Act or under existing laws. security breach.
- The processing of sensitive - SEC. 31. Malicious Disclosure. –
personal information for Any personal information controller
unauthorized purposes shall be or personal information processor
penalized by imprisonment ranging or any of its officials, employees or
from two (2) years to seven (7) agents, who, with malice or in bad
years and a fine of not less than faith, discloses unwarranted or
Five hundred thousand pesos false information relative to any
(Php500,000.00) but not more than personal information or personal
Two million pesos sensitive information obtained by
(Php2,000,000.00) shall be him or her, shall be subject to
imposed on persons processing imprisonment ranging from one (1)
sensitive personal information for year and six (6) months to five (5)
purposes not authorized by the years and a fine of not less than
data subject, or otherwise Five hundred thousand pesos
authorized under this Act or under (Php500,000.00) but not more than
existing laws. One million pesos
- SEC. 29. Unauthorized Access or (Php1,000,000.00).
Intentional Breach. – The penalty - SEC. 32. Unauthorized Disclosure.
of imprisonment ranging from one – (a) Any personal information
(1) year to three (3) years and a controller or personal information
fine of not less than Five hundred processor or any of its officials,
thousand pesos (Php500,000.00) employees or agents, who
but not more than Two million discloses to a third party personal
pesos (Php2,000,000.00) shall be information not covered by the
imposed on persons who immediately preceding section
knowingly and unlawfully, or without the consent of the data
violating data confidentiality and subject, shall he subject to
security data systems, breaks in imprisonment ranging from one (1)
any way into any system where year to three (3) years and a fine of
personal and sensitive personal not less than Five hundred
information is stored. thousand pesos (Php500,000.00)
- SEC. 30. Concealment of Security but not more than One million
Breaches Involving Sensitive pesos (Php1,000,000.00).
Personal Information. – The - (b) Any personal information
penalty of imprisonment of one (1) controller or personal information
year and six (6) months to five (5) processor or any of its officials,
years and a fine of not less than employees or agents, who
discloses to a third party sensitive - SEC. 35. Large-Scale. – The
personal information not covered maximum penalty in the scale of
by the immediately preceding penalties respectively provided for
section without the consent of the the preceding offenses shall be
data subject, shall be subject to imposed when the personal
imprisonment ranging from three information of at least one hundred
(3) years to five (5) years and a (100) persons is harmed, affected
fine of not less than Five hundred or involved as the result of the
thousand pesos (Php500,000.00) above mentioned actions.
but not more than Two million - SEC. 36. Offense Committed by
pesos (Php2,000,000.00). Public Officer. – When the offender
- SEC. 33. Combination or Series of or the person responsible for the
Acts. – Any combination or series offense is a public officer as
of acts as defined in Sections 25 to defined in the Administrative Code
32 shall make the person subject of the Philippines in the exercise of
to imprisonment ranging from three his or her duties, an accessory
(3) years to six (6) years and a fine penalty consisting in the
of not less than One million pesos disqualification to occupy public
(Php1,000,000.00) but not more office for a term double the term of
than Five million pesos criminal penalty imposed shall he
(Php5,000,000.00). applied.
- SEC. 34. Extent of Liability. – If the - SEC. 37. Restitution. – Restitution
offender is a corporation, for any aggrieved party shall be
partnership or any juridical person, governed by the provisions of the
the penalty shall be imposed upon New Civil Code.
the responsible officers, as the - CHAPTER IX
case may be, who participated in, - MISCELLANEOUS PROVISIONS
or by their gross negligence, - SEC. 38. Interpretation. – Any
allowed the commission of the doubt in the interpretation of any
crime. If the offender is a juridical provision of this Act shall be
person, the court may suspend or liberally interpreted in a manner
revoke any of its rights under this mindful of the rights and interests
Act. If the offender is an alien, he of the individual about whom
or she shall, in addition to the personal information is processed.
penalties herein prescribed, be - SEC. 39. Implementing Rules and
deported without further Regulations (IRR). – Within ninety
proceedings after serving the (90) days from the effectivity of this
penalties prescribed. If the Act, the Commission shall
offender is a public official or promulgate the rules and
employee and lie or she is found regulations to effectively implement
guilty of acts penalized under the provisions of this Act.
Sections 27 and 28 of this Act, he - SEC. 40. Reports and Information.
or she shall, in addition to the – The Commission shall annually
penalties prescribed herein, suffer report to the President and
perpetual or temporary absolute Congress on its activities in
disqualification from office, as the carrying out the provisions of this
case may be. Act. The Commission shall
undertake whatever efforts it may
determine to be necessary or executive orders, proclamations
appropriate to inform and educate and administrative regulations or
the public of data privacy, data parts thereof inconsistent herewith
protection and fair information are hereby repealed or modified
rights and responsibilities. accordingly.
- SEC. 41. Appropriations Clause. – - SEC. 45. Effectivity Clause. – This
The Commission shall be provided Act shall take effect fifteen (15)
with an initial appropriation of days after its publication in at least
Twenty million pesos two (2) national newspapers of
(Php20,000,000.00) to be drawn general circulation.
from the national government.
Appropriations for the succeeding
years shall be included in the
General Appropriations Act. It shall Challenges of Technology
likewise receive Ten million pesos
Security
(Php10,000,000.00) per year for ● primary concern in healthcare
five (5) years upon implementation applications
of this Act drawn from the national HOW TO AVOID: To build a
government. compliant telehealth application,
- SEC. 42. Transitory Provision. – specific encryption algorithms and
Existing industries, businesses and data security standards need to be
followed
offices affected by the
The Challenge of Interoperability
implementation of this Act shall be ● electronic health records (EHRs) is
given one (1) year transitory period they allow practitioners to access
from the effectivity of the IRR or relevant patient data instantly
such other period as may be ● interoperability is proving to be a
determined by the Commission, to challenge
comply with the requirements of ● Patient identification isn't
standardized
this Act.
● Nearly anyone can input
- In case that the DICT has not yet information into a patient's EHR
been created by the time the law HOW TO AVOID: to implement
takes full force and effect, the cloud-base HER’s, which
National Privacy Commission shall centralize the database while still
be attached to the Office of the providing the necessary security.
Keeping up with old technology
President.
● many facilities still use out-of-date
- SEC. 43. Separability Clause. – If technology
any provision or part hereof is held ● Outdated software creates security
invalid or unconstitutional, the holes and allows hackers to easily
remainder of the law or the access the system
provision not otherwise affected HOW TO AVOID:
shall remain valid and subsisting. ● to upgrade software immediately
when possible
- SEC. 44. Repealing Clause. – The
● The facility’s IT department should
provision of Section 7 of Republic be fluent in every operating system
Act No. 9372, otherwise known as that is currently in use
the “Human Security Act of 2007”, Unfriendly User Interfaces
is hereby amended. Except as ● As medical technology advances
otherwise expressly provided in user interface is still difficult to use
this Act, all other laws, decrees, HOW TO AVOID:
● engage with manufacturers during ● a cybercrime in which scammers
the research and development try to lure sensitive information or
phase and let them know what's data from a person , by disguising
needed
themselves as a trustworthy
● take the time to learn how
unfriendly interfaces work source.
Overcomplicated Asset Tracking ● Attacks can facilitate access to a
● Asset tracking through electronic person's online accounts and
health records can be both a personal data, obtain permissions
blessing and a curse. to modify and compromise
● physicians often complain that connected systems--such as point
poorly designed systems impede
of sale terminals and order
their work, making them a slave to
their EHRs processing systems--and in some
HOW TO AVOID: cases hijack entire computer
● While this challenge is not networks until a ransom fee is
avoidable, physicians can reduce delivered.
the strain and chance of
technology burnout by participating The Threat of Phishing Attacks on the
in training offered by providers Healthcare Industry
Overall Implementation
● Without a comprehensive Phishing attacks on the healthcare
understanding, trying to use industry usually have one of two
medical technology can lead to objectives – to obtain access to PHI
practitioner error and malpractice.
(Protected Health Information) or to deliver
HOW TO AVOID:
● Hospital administrators, medical ransomware.
professionals and IT teams need to ● PHI is now a valuable commodity
tackle this challenge head-on on the black market as it can be
● take the time to adapt with the used to create false identities,
changing times. obtain free medical treatment, and
● commit insurance fraud.
Current Technology: Issues and
Many of the successful attacks are
Dilemma
attributable to the increasing number of
employees using their mobile devices at
The industrial revolution of the nineteenth
work, who fail to translate their online
century gave rise to a number of
security training to their mobile online
unforeseen ethical and social issues—for
activities.
instance, concerns about workplace
safety, wages, discrimination, and child How Phishing Attacks on the Healthcare
labor—which led to real changes in worker Industry are Deployed
protections, labor practices, and law.
Similarly, the technology revolution of the Most phishing attacks on the healthcare
twentieth century—starting with the industry are deployed by email. The
widespread use of the Internet and home communications generally look authentic,
computers—has spawned a new set of and instruct employees to follow a link to a
ethical and social concerns that people a web page – where they will be asked
hundred years ago couldn’t have complete some action that will trigger a
imagined. malware download or enter their
username and password to continue.
1. PHISHING
The malware download may not According to Mobile Device Security:
necessarily contain ransomware. Perspectives of Future Healthcare
Surveillance software such as adware and Workers (Hewitt, 2017), Healthcare
professionals are responsible for
keystroke loggers can be downloaded to
protecting the privacy, security, and
follow an employee´s online activities and confidentiality of electronic health
record their usernames and passwords. If information. Although the use of mobile
the phishing attempt has been successful devices by healthcare professionals
in obtaining a username and password, increases connectivity and enables remote
the hacker will likely be able to access PHI logins to electronic health records, it also
almost immediately. introduces many significant new security
risks. Major healthcare data breach is
because of Hacking/information
technology incident and laptop theft.
How to Protect Healthcare Data from
Phishing Given that all the patient’s data is
confidential, precautions should be done
Because there are so many vehicles in order to protect their data. In many
through which employees can receive ways, protecting patient information on
mobile devices comes down to the same
communications instructing them to visit common sense principles that one would
an unsafe website, the best way to protect use to protect his or her own personal
healthcare data from phishing is to data.
prevent employees from being able to visit The following is the 6 Best Practices for
the unsafe website. This can be achieved Mobile Device Security in Healthcare
through the use of a web filter that is 1. Implement user authentication
configured to deny access to fake controls. One of the biggest dangers to
websites and websites harboring malware, any device, in and outside of healthcare,
and that will block the downloading of file
is inadequate security controls. Locking
types most commonly associated with
the device with a passcode and using
malware.
Web filters protect healthcare data from biometrics can go a long way to keeping
phishing attacks: the device data safe from prying eyes.
1. Blacklists Providers should use any and all device
2. Category filters locking mechanisms to secure devices
3. Keyword filters used for work.

These three mechanisms work in unison


to protect healthcare data from phishing 2. Implement remote and automatic
and to prevent other web-borne threats.
lock and wipe capabilities for use when
a device is lost or stolen, or after an
2. MOBILE SECURITY excessive number of incorrect login
attempts.
Mobile security is the protection of
smartphones, tablets, laptops and other
portable computing devices, and the 3. Install security programs. With
networks they connect to, from threats and hackers and viruses now targeting mobile
vulnerabilities associated with wireless devices with the same intensity as desktop
computing. Mobile security is also known
as wireless security. computers, it’s important for health care
professionals to install Internet security
software onto their mobile devices as well,
to prevent harmful apps and malware from
infiltrating the health care networks and
compromising protected data. 3. CYBER SECURITY THREATS

● A cyber or cybersecurity threat is a


4. Employ encryption. Whether on a malicious act that seeks to damage
device or an app-by-app basis, data that is data, steal data, or disrupt digital
life in general. Cyber attacks
stored or transmitted via the device should
include threats like computer
be encrypted. Email and attachments
viruses, data breaches, and Denial
should also be secured and encrypted to of Service (DoS) attacks.
ensure that unauthorized individuals do ● Healthcare cybersecurity has
not see it — even by accident. become one of the significant
threats in the healthcare industry.
As a whole, IT professionals must
5. Develop an application policy. In continually address healthcare
BYOD environment’s controlling the data security issues because of
applications installed on personal devices specifics outlined in the Health
is a touchy subject, but it is vital for health Insurance Portability and
Accountability Act (HIPAA) laws as
care users to understand the potential
well as the ethical commitment to
risks associated with harmful applications.
help patients and the damage that
At the very least, providers must be healthcare security breaches can
educated on how to evaluate apps, or have on their lives.
seek approval for the installation of ● Electronic health records, also
unapproved apps on devices used for referred to as EHRs, contain a
work. At the very least, file-sharing host of sensitive information about
applications should be banned, and patients’ medical histories, making
providers prohibited from using hospital network security a primary
IT concern. EHRs make it possible
unapproved and unsecured filing-sharing
for physicians and other healthcare
services to share patient data.
professionals, as well as insurance
companies, to share essential
information. This makes it easier to
6. Encourage regular updates. Updating both coordinate care and facilitate
operating systems regularly is an insurance matters.
important part of any security strategy.
Hackers target vulnerabilities in operating Types of Cyber Threats:
systems, and installing updates helps
close those holes and protect data. A. Computer viruses
Develop a policy of notifying providers of
- Perhaps the most well-known
important updates and enforce update
computer security threat, a
requirements.
computer virus is a program written
to alter the way a computer
operates, without the permission or
knowledge of the user. A virus access to your network. Once they
replicates and executes itself, are in – it’s often too late to take
usually doing damage to your preventative action.
computer in the process. - To counteract this, it’s smart to
- Carefully evaluating free software, invest in a patch management
downloads from peer-to-peer file system that will manage all
sharing sites, and emails from software and system updates,
unknown senders are crucial to keeping your system resilient and
avoiding viruses. Most web up to date.
browsers today have security
settings which can be ramped up 2. Install a Firewall
for optimum defense against online - There are so many different types
threats. the single most-effective of sophisticated data breaches and
way of fending off viruses is new ones surface every day and
up-to-date antivirus software from even make comebacks.
a reputable provider. - Putting your network behind a
firewall is one of the most effective
ways to defend yourself from any
B. Spyware Threats cyber attack. A firewall system will
block any brute force attacks made
- A serious computer security threat, on your network and/or systems
spyware is any program that before it can do any damage.
monitors your online activities or 3. Control access to your systems
installs programs without your - Believe it or not, one of the attacks
consent for profit or to capture that you can receive on your
personal information. systems can be physical, having
- While many users won't want to control over who can access your
hear it, reading terms and network is really important.
conditions is a good way to build Somebody can simply walk into
an understanding of how your your office or enterprise and plug
activity is tracked online. And of in a USB key containing infected
course, if a company you don't files into one of your computers
recognize is advertising for a deal allowing them access to your entire
that seems too good to be true, be network or infect it.
sure you have an internet security - It’s essential to control who has
solution in place and click with access to your computers. Having
caution. a perimeter security system
installed is a very good way to stop
How to prevent Cyber Security Threats? cybercrime as much as break ins.

1. Keep your software and systems 4. Backup your data


fully up to date - In the event of a disaster (often a
- Often cyber attacks happen cyber attack) you must have your
because your systems or software data backed up to avoid serious
aren’t fully up to date, leaving downtime, loss of data and serious
weaknesses. Hackers exploit these financial loss.
weaknesses so cybercriminals
exploit these weaknesses to gain
REFERENCES:

Types of computer security threats.


(2018). Retrieved April 16, 2021, from
https://www.webroot.com/us/en/resources/
tips-articles/computer-security-threats

Hewitt, B., Dolezel, D., & McLeod, A.


(2017, January 1). Mobile device security:
Perspectives of future healthcare workers.
Retrieved April 16, 2021, from
https://www.ncbi.nlm.nih.gov/pmc/articles/
PMC5430111/

Leaders, O. (2015, November 03). 5


best practices for mobile device
security in healthcare. Retrieved
April 16, 2021, from
https://hitconsultant.net/2015/11/03/5
-best-practices-for-mobile-device-se
curity-in-healthcare/#.YHlQdugzbIU

HIPAA Journal. (n.d.). Protect Healthcare


Data from Phishing.
https://www.hipaajournal.com/protect-healt
hcare-data-from-phishing/#:~:text=The%2
0Threat%20of%20Phishing%20Attacks%2
0on%20the%20Healthcare%20Industry&t
ext=Phishing%20attacks%20are%20beco
ming%20a,Saint%20Agnes%20Heath%20
Care%20Inc.
GROUP 3: BIOETHICS AND RESEARCH 6. The degree of risk to be taken should
never exceed that determined by the
A. Principles of Ethics in Research humanitarian importance of the
a. Nuremberg Code - developed following problem to be solved by the
the Nuremberg Military Tribunal as a experiment
standard by which to judge human 7. Proper preparations should be made
experimentation conducted by the Nazis. and adequate facilities provided to
This code covers several basic principles protect the experimental subject
in the ethical conduct of using humans against even remote possibilities of
for research, including voluntary injury, disability, or death
consent. 8. The experiment should be conducted
- The first trial was called The only by scientifically qualified
Doctor’s Trial officially known as persons. The highest degree of skill
The United States of America v. and care should be required through
Karl Brandt, et al. all stages of the experiment of those
Significance: who conduct or engage in the
- It influenced the principles of Good experiment.
Clinical Practice which provides a 9. During the course of the experiment,
standard for study design, the human subject should be at
implementation, conduct and liberty to bring the experiment to an
analysis end if he has reached the physical or
- Protects participants of clinical mental state where continuation of
research from exploitation, abuse, the experiment seems to him to be
injury, and death impossible.
10 Basic Principles: 10. During the course of the experiment,
1. The voluntary consent of the human the scientist in charge must be
subject is ABSOLUTELY prepared to terminate the experiment
ESSENTIAL. at any stage, if he has probable
2. The experiment should be used to cause to believe, in the exercise of
yield fruitful results for the good of the good faith, superior skill and
the society, unprocurable by other careful judgement required of him,
methods or means of study, and not that a continuation of the experiment
random and unnecessary in nature is likely to result in injury, disability, or
3. The experiment should be so death to the experimental subject.
designed and based on the results of
animal experimentation and a b. Declaration of Helsinki
knowledge of the natural history of A statement outlining the ethical principles for
the disease or other problem under medical research involving human subjects
study that the anticipated results which was initially adopted by the 18th Assembly
justify the performance of the of the World Medical Association in Helsinki,
experiment Finland.
4. The experiment should be so - It was developed from the 10 principles in
conducted as to avoid all the Nuremberg code and further
unnecessary physical and mental incorporated elements from the
suffering and injury Declaration of Geneva.
5. No experiment should be conducted - Addressed primarily to physicians, but
where there is an a priori reason to encourages others involved in medical
believe that death or disabling injury research involving human subjects to
will occur; except, perhaps, in those adopt these principles.
experiments where the experimental General Principles
physicians also serve as subjects The general principles act as the foundation for
ethical standards including:
- Protecting patient health
- Knowledge cannot trample rights 8) Physicians must consider the ethical, legal
- Additional considerations and regulatory norms and standards for
- Following local regulatory norms research involving human subjects in their
own countries as well as applicable
The following are the General Principles of the international norms and standards. No
Declaration of Helsinki: national or international ethical, legal or
1) The Declaration of Geneva of the WMA regulatory requirement should reduce or
binds the physician with the words, “The eliminate any of the protections for
health of my patient will be my first research subjects set forth in this
consideration,” and the International Declaration.
Code of Medical Ethics declares that, “A 9) Medical research should be conducted in
physician shall act in the patient’s best a manner that minimises possible harm to
interest when providing medical care.” the environment.
2) It is the duty of the physician to promote 10) Medical research involving human
and safeguard the health, well-being and subjects must be conducted only by
rights of patients, including those who are individuals with the appropriate ethics and
involved in medical research. The scientific education, training and
physician’s knowledge and conscience are qualifications. Research on patients or
dedicated to the fulfilment of this duty. healthy volunteers requires the
3) Medical progress is based on research supervision of a competent and
that ultimately must include studies appropriately qualified physician or other
involving human subjects. health care professional.
4) The primary purpose of medical research 11) Groups that are underrepresented in
involving human subjects is to medical research should be provided
understand the causes, development appropriate access to participation in
and effects of diseases and improve research.
preventive, diagnostic and therapeutic 12) Physicians who combine medical research
interventions (methods, procedures and with medical care should involve their
treatments). Even the best proven patients in research only to the extent that
interventions must be evaluated this is justified by its potential preventive,
continually through research for their diagnostic or therapeutic value and if the
safety, effectiveness, efficiency, physician has good reason to believe that
accessibility and quality. participation in the research study will not
5) Medical research is subject to ethical adversely affect the health of the patients
standards that promote and ensure who serve as research subjects.
respect for all human subjects and protect 13) Appropriate compensation and treatment
their health and rights. for subjects who are harmed as a result of
6) While the primary purpose of medical participating in research must be ensured.
research is to generate new knowledge,
this goal can never take precedence over Specific Sections addressed within the
the rights and interests of individual Declaration of Helsinki
research subjects. - Risks, Burdens and Benefits
7) It is the duty of physicians who are - Vulnerable Groups and Individuals
involved in medical research to protect - Scientific Requirements and Research
the life, health, dignity, integrity, right Protocols
to self-determination, privacy, and - Research Ethics Committees
confidentiality of personal information - Privacy and Confidentiality
of research subjects. The responsibility - Informed Consent
for the protection of research subjects - Use of Placebo
must always rest with the physician or - Post-Trial Provisions
other health care professionals and never - Research Registration and Publication
with the research subjects, even though and Dissemination of Results
they have given consent. - Unproven interventions in clinical practice
Risk, Burdens and Benefits responsive to the health needs or
Medical research must only be conducted if the priorities of this group and the
importance of the findings outweigh the risks and research cannot be carried out in a
burdens to the research subjects. This involves non-vulnerable group. In addition, this
reflecting on the impacts on the individual group should stand to benefit from the
participating, as well as the potential benefits to knowledge, practices or interventions that
them and others who may be similarly affected by result from the research.
the disease.
Scientific Requirements and Research
1) Medical research involving human Protocol
subjects may only be conducted if the The basis for medical research must rest in sound
importance of the objective outweighs the scientific inquiry. This requires thorough
risks and burdens to the research knowledge of the existing scientific literature,
subjects. other relevant sources of information, and
2) All medical research involving human techniques of experimentation.
subjects must be preceded by careful
assessment of predictable risks and 1) Medical research involving human
burdens to the individuals and groups subjects must conform to generally
involved in the research in comparison accepted scientific principles, be based on
with foreseeable benefits to them and to a thorough knowledge of the scientific
other individuals or groups affected by the literature, other relevant sources of
condition under investigation. Measures information, and adequate laboratory and,
to minimise the risks must be as appropriate, animal experimentation.
implemented. The risks must be The welfare of animals used for research
continuously monitored, assessed and must be respected.
documented by the researcher. 2) The design and performance of each
3) Physicians may not be involved in a research study involving human subjects
research study involving human subjects must be clearly described and justified in a
unless they are confident that the risks research protocol. The protocol should
have been adequately assessed and can contain a statement of the ethical
be satisfactorily managed. When the risks considerations involved and should
are found to outweigh the potential indicate how the principles in this
benefits or when there is conclusive proof Declaration have been addressed. The
of definitive outcomes, physicians must protocol should include information
assess whether to continue, modify or regarding funding, sponsors, institutional
immediately stop the study. affiliations, potential conflicts of interest,
incentives for subjects and information
Vulnerable Groups and Individuals regarding provisions for treating and/or
Special protections must be implemented to compensating subjects who are harmed
protect some individuals and groups who are as a consequence of participation in the
particularly vulnerable with a higher likelihood of research study. In clinical trials, the
becoming wronged or incurring additional harm protocol must also describe appropriate
due to their status. arrangements for post-trial provisions.

1) Some groups and individuals are Research Ethics Committees


particularly vulnerable and may have an Before starting a study, researchers should
increased likelihood of being wronged or submit their protocol for review by the Research
of incurring additional harm. All Ethics Committee.
vulnerable groups and individuals 1) The research protocol must be submitted
should receive specifically considered for consideration, comment, guidance and
protection. approval to the concerned research ethics
2) Medical research with a vulnerable group committee before the study begins. This
is only justified if the research is committee must be transparent in its
functioning, must be independent of the of interest, institutional affiliations of the
researcher, the sponsor and any other researcher, the anticipated benefits and
undue influence and must be duly potential risks of the study and the
qualified. It must take into consideration discomfort it may entail, post-study
the laws and regulations of the country or provisions and any other relevant aspects
countries in which the research is to be of the study. The potential subject must be
performed as well as applicable informed of the right to refuse to
international norms and standards but participate in the study or to withdraw
these must not be allowed to reduce or consent to participate at any time without
eliminate any of the protections for reprisal. Special attention should be given
research subjects set forth in this to the specific information needs of
Declaration. individual potential subjects as well as to
The committee must have the right to the methods used to deliver the
monitor ongoing studies. The researcher information. After ensuring that the
must provide monitoring information to the potential subject has understood the
committee, especially information about information, the physician or another
any serious adverse events. No appropriately qualified individual must
amendment to the protocol may be made then seek the potential subject’s
without consideration and approval by the freely-given informed consent, preferably
committee. After the end of the study, the in writing. If the consent cannot be
researchers must submit a final report to expressed in writing, the non-written
the committee containing a summary of consent must be formally documented and
the study’s findings and conclusions. witnessed. All medical research subjects
should be given the option of being
Privacy and Confidentiality informed about the general outcome and
The Declaration of Helsinki also underscores the results of the study.
need for researchers to keep the personal 3) When seeking informed consent for
information of the subjects confidential. participation in a research study the
physician must be particularly cautious if
1) Every precaution must be taken to protect the potential subject is in a dependent
the privacy of research subjects and the relationship with the physician or may
confidentiality of their personal consent under duress. In such situations
information. the informed consent must be sought by
an appropriately qualified individual who is
Informed Consent completely independent of this
Participation in medical research must be relationship.
voluntary and informed consent should be 4) For a potential research subject who is
obtained in writing from those who are able to incapable of giving informed consent, the
provide it. physician must seek informed consent
from the legally authorised representative.
1) Participation by individuals capable of These individuals must not be included in
giving informed consent as subjects in a research study that has no likelihood of
medical research must be voluntary. benefit for them unless it is intended to
Although it may be appropriate to consult promote the health of the group
family members or community leaders, no represented by the potential subject, the
individual capable of giving informed research cannot instead be performed
consent may be enrolled in a research with persons capable of providing
study unless he or she freely agrees. informed consent, and the research
2) In medical research involving human entails only minimal risk and minimal
subjects capable of giving informed burden.
consent, each potential subject must be 5) When a potential research subject who is
adequately informed of the aims, methods, deemed incapable of giving informed
sources of funding, any possible conflicts consent is able to give assent to decisions
about participation in research, the 1) The benefits, risks, burdens and
physician must seek that assent in effectiveness of a new intervention must
addition to the consent of the legally be tested against those of the best proven
authorised representative. The potential intervention(s), except in the following
subject’s dissent should be respected. circumstances:
6) Research involving subjects who are ➢ Where no proven intervention
physically or mentally incapable of giving exists, the use of placebo, or no
consent, for example, unconscious intervention, is acceptable; or
patients, may be done only if the physical ➢ Where for compelling and
or mental condition that prevents giving scientifically sound methodological
informed consent is a necessary reasons the use of any intervention
characteristic of the research group. In less effective than the best proven
such circumstances the physician must one, the use of placebo, or no
seek informed consent from the legally intervention is necessary to
authorised representative. If no such determine the efficacy or safety of
representative is available and if the an intervention; and
research cannot be delayed, the study ➢ the patients who receive any
may proceed without informed consent intervention less effective than the
provided that the specific reasons for best proven one, placebo, or no
involving subjects with a condition that intervention will not be subject to
renders them unable to give informed additional risks of serious or
consent have been stated in the research irreversible harm as a result of not
protocol and the study has been approved receiving the best proven
by a research ethics committee. Consent intervention.
to remain in the research must be Extreme care must be taken to avoid
obtained as soon as possible from the abuse of this option.
subject or a legally authorised
representative. Post-Trivial Provisions
7) The physician must fully inform the patient 1) In advance of a clinical trial, sponsors,
which aspects of their care are related to researchers and host country
the research. The refusal of a patient to governments should make provisions for
participate in a study or the patient’s post-trial access for all participants who
decision to withdraw from the study must still need an intervention identified as
never adversely affect the beneficial in the trial. This information
patient-physician relationship. must also be disclosed to participants
8) For medical research using identifiable during the informed consent process.
human material or data, such as research
on material or data contained in biobanks Research Registration and Publication and
or similar repositories, physicians must Dissemination of Results
seek informed consent for its collection, 1) Every research study involving human
storage and/or reuse. There may be subjects must be registered in a publicly
exceptional situations where consent accessible database before recruitment of
would be impossible or impracticable to the first subject.
obtain for such research. In such 2) Researchers, authors, sponsors, editors
situations the research may be done only and publishers all have ethical obligations
after consideration and approval of a with regard to the publication and
research ethics committee. dissemination of the results of research.
Researchers have a duty to make publicly
Use of Placebo available the results of their research on
As a general rule, new interventions must be human subjects and are accountable for
tested against the existing gold standard, the best the completeness and accuracy of their
proven treatment that presently exists. reports. All parties should adhere to
accepted guidelines for ethical reporting.
Negative and inconclusive as well as and routine practice of
positive results must be published or medicine
otherwise made publicly available. 2. the role of assessment of
Sources of funding, institutional affiliations risk-benefit criteria in the
and conflicts of interest must be declared determination of the
in the publication. Reports of research not appropriateness of
in accordance with the principles of this research involving human
Declaration should not be accepted for subjects,
publication. 3. appropriate guidelines for
the selection of human
Unproven Interventions in Clinical Practice subjects for participation in
1) In the treatment of an individual patient, such research
where proven interventions do not exist or 4. the nature and definition of
other known interventions have been informed consent in various
ineffective, the physician, after seeking research settings.
expert advice, with informed consent from - Belmont Report attempts to summarize
the patient or a legally authorised the basic ethical principles identified by
representative, may use an unproven the Commission in the course of its
intervention if in the physician’s judgement deliberations
it offers hope of saving life, re-establishing - It is a statement of basic ethical principles
health or alleviating suffering. This and guidelines that should assist in
intervention should subsequently be made resolving the ethical problems that
the object of research, designed to surround the conduct of research with
evaluate its safety and efficacy. In all human subjects
cases, new information must be recorded - Ethical Principles & Guidelines for
and, where appropriate, made publicly Research Involving Human Subjects
available. under the belmont report
- Three principles, or general
BELMONT REPORT prescriptive judgments, that are
- Also known as the Ethical Principles and relevant to research involving
Guidelines for the Protection of Human human subjects are identified in
Subjects of Research this statement.
- The report was written by the National 1. Respect for persons
Commission for the Protection of Human 2. Beneficence
Subjects of Biomedical and Behavioral 3. Justice
Research Part A: Boundaries Between Practice & Research
- National Commission for the Protection of - It is important to distinguish between
Human Subjects of Biomedical and biomedical and behavioral research, and
Behavioral Research the practice of accepted therapy on the
- The commission identifies basic other, in order to know what activities
ethical principles that should ought to undergo review for the protection
underlie the conduct of biomedical of human subjects of research
and behavioral research involving - practice refers to interventions that are
human subjects designed solely to enhance the well-being
- develops guidelines which should of an individual patient or client and that
be followed to assure that such have a reasonable expectation of
research is conducted in success. The purpose of medical or
accordance with those principles behavioral practice is to provide diagnosis,
- Commission was directed to consider preventive treatment or therapy to
1. the boundaries between particular individuals
biomedical and behavioral - Research designates an activity designed
research and the accepted to test an hypothesis, permit conclusions
to be drawn, and thereby to develop or
contribute to generalizable knowledge administered fairly — the fair
Research is usually described in a formal distribution of costs and benefits to
protocol that sets forth an objective and a potential research participants —
set of procedures designed to reach that and equally
objective - justice demands both that these
- Research and practice may be carried on not provide advantages only to
together when research is designed to those who can afford them and
evaluate the safety and efficacy of a that such research should not
therapy unduly involve persons from
groups unlikely to be among the
Part B: Basic Ethical Principles beneficiaries of subsequent
- The expression "basic ethical principles" applications of the research
refers to those general judgments that
serve as a basic justification for the many Part C: Applications
particular ethical prescriptions and - Informed Consent. -- Respect for
evaluations of human actions. persons requires that subjects, to the
- Respect for Persons: degree that they are capable, be given the
- In the report it incorporates at least opportunity to choose what shall or shall
two ethical convictions: first, that not happen to them. controversy prevails
individuals should be treated as over the nature and possibility of an
autonomous agents, and second, informed consent. Nonetheless, there is
that persons with diminished widespread agreement that the consent
autonomy are entitled to process can be analyzed as containing
protection. The principle of three elements: information,
respect for persons thus divides comprehension and voluntariness.
into two separate moral ✓ Information. Most codes of
requirements: the requirement to research establish specific items
acknowledge autonomy and the for disclosure intended to assure
requirement to protect those with that subjects are given sufficient
diminished autonomy information. These items generally
- respect for persons demands that include: the research procedure,
subjects enter into the research their purposes, risks and
voluntarily and with adequate anticipated benefits, alternative
information procedures (where therapy is
- Beneficence. involved), and a statement offering
- Persons are treated in an ethical the subject the opportunity to ask
manner not only by respecting their questions and to withdraw at any
decisions and protecting them from time from the research. Additional
harm, but also by making efforts to items have been proposed,
secure their well-being. including how subjects are
- In the Belmont report, beneficence selected, the person responsible
is understood in a stronger sense, for the research, etc
as an obligation. ✓ Comprehension. The manner and
- Two general rules have been context in which information is
formulated as complementary conveyed is as important as the
expressions of beneficent actions information itself Because the
in this sense: (1) do not harm and subject's ability to understand is a
(2) maximize possible benefits and function of intelligence, rationality,
minimize possible harms. maturity and language, it is
- Justice. necessary to adapt the
- ensuring reasonable, presentation of the information to
non-exploitative, and the subject's capacities.
well-considered procedures are Investigators are responsible for
ascertaining that the subject has potentially beneficial research only to
comprehended the information some patients who are in their favor or
✓ Voluntariness. An agreement to select only "undesirable" persons for risky
participate in research constitutes research. Social justice requires that
a valid consent only if voluntarily distinction be drawn between classes of
given. This element of informed subjects that ought, and ought not, to
consent requires conditions free of participate in any particular kind of
coercion and undue influence. research, based on the ability of members
Coercion occurs when an overt of that class to bear burdens and on the
threat of harm is intentionally appropriateness of placing further burdens
presented by one person to on already burdened persons.
another in order to obtain
compliance. Unjustifiable B. Ethical Issues in Evidence-Based
pressures usually occur when Practice
persons in positions of authority or
commanding influence -- especially Driven by increased accountability, the
where possible sanctions are widespread and convenient availability of
involved information spawned by the Information
- Assessment of Risks and Benefits. -- Age, the health care community is turning
The assessment of risks and benefits increased attention towards evaluating
requires a careful arrayal of relevant data, established practices or what is
including, in some cases, alternative ways commonly known as Evidence-Based
of obtaining the benefits sought in the Practice.
research. requirement that research be
justified on the basis of a favorable
UNDERSTANDING THE TERMS
risk/benefit assessment bears a close
relation to the principle of beneficence,
Evidence: It is something that furnishes proof
just as the moral requirement that
or testimony or something legally submitted to
informed consent be obtained is derived
ascertain in the truth of matter.
primarily from the principle of respect for
persons. The term "risk" refers to a
Evidence based medicine or practice- The
possibility that harm may occur. However,
conscientious, explicit and judicious use of
when expressions such as "small risk" or
current best evidence in making decisions
"high risk" are used, they usually refer
about the care of individual patients. (Dr. David
both to the chance of experiencing a harm
Sackett, Rosenberg, 1996)
and the severity of the envisioned harm.
"benefit" is used in the research context
Evidence based nursing- it is a process by
to refer to something of positive value
which nurses make clinical decisions using the
related to health or welfare
best available research evidence, their clinical
- Selection of Subjects. -- Just as the
expertise and patient preferences (mulhall,
principle of respect for persons finds
1998). •
expression in the requirements for
consent, and the principle of beneficence
in risk/benefit assessment, the principle of
justice gives rise to moral requirements
that there be fair procedures and In recent decades, EBP has become a key
outcomes in the selection of research component of exceptional patient care.
subjects. Justice is relevant to the
selection of subjects of research at two Registered nurses (RN) deliver care to patients
levels: the social and the individual. by applying validated interventions. In a
Individual justice in the selection of Bachelor of Science in Nursing (BSN) program,
subjects would require that researchers nurses learn about evidence-based practice
exhibit fairness: thus, they should not offer
(EBP), which aids them in pinpointing care especially to the participant (patient)
strategies that can help their patients. involved in the research as it is our
responsibility to consider whether any type
The inclusion of EBP in nursing provides nurses of harm could occur when planning and
with the scientific research to make well-founded implementing research since this involves
decisions. Through EBP, nurses can human intervention.

● Stay updated about new medical protocols WHY IS IT IMPORTANT TO CONSIDER


for patient care. By searching for THESE ETHICAL ISSUES ?
documented interventions that fit the
profiles of their patients, nurses can
increase their patients' chances for The identification of these issues is not
recovery. intended to diminish the importance of the
● EBP enables nurses to evaluate research evidence-based practice but, rather, to
so they understand the risks or point out that ethical issues are embedded
effectiveness of a diagnostic test or throughout the health care practices. To
treatments. the extent that we are aware of them, we
● The application of EBP enables nurses to are better prepared to avoid
include patients in their care plan. This complications.
allows patients to have a proactive role in
their own healthcare since they can voice ETHICAL CONCERNS OF EBP
concerns, share their values and
preferences and make suggestions on ● Status of Evidence
how they want to proceed. Available evidence in health care
areas consists mostly of expert
BUT HOW IS THE CONSIDERATION OF
opinions where despite important
ETHICS INVOLVED IN
advances in research, only few
EVIDENCE-BASED PRACTICE?
have amassed sufficient data to
enable research-based confidence
The primary reason for implementing
in treatment interventions
evidence-based practice is to produce the
most effective medical, rehabilitation and This means that much of traditional
health outcomes. However, each patient rehabilitation practice unfortunately
care encounter includes issues related to lacks sufficient research for the
the established practices of the discipline, careful, well-documented analyses
what the patient prefers, concern for expected in making confident,
quality of life, and contextual evidence-based decisions. More
research is needed to provide
features-personal story that places the evidence to guide interventions
experience within a real-life context for the that reduce disability for specific
patient. conditions, populations, and
. settings. Practitioners must not
Ethical issues are part of every health care solely based on expert opinions
encounter and moral principles such as but must also acknowledge the
basis of a given intervention such
truth, fairness, avoiding harm, and as clinical tradition and anecdotal
respecting autonomy lie at the heart of results.
these concerns
Some types of knowledge are
Since Evidence based practice focuses on not included in EBP. EBP
searching and appraising available discounts types of knowledge that
evidence on the advantages and are used by practitioners and
disadvantages of various interventions. which are important for good
Thus, the consideration of ethics in practice; these include experience,
research is of growing importance and intuition.
for competing hypotheses are
In health care, EBP fits best with emphasized as necessary for
tightly defined areas of practice, achieving valid conclusions, the
particularly pharmacology, but is ill ethical threats involved in
suited for the more craft-like areas, conducting such research are
such as surgery and nursing. In sometimes understated. Again,
these areas, experience counts for scientists rather than patients
a great deal, and a patient would mostly determine decisions about
be better served by an who participates in studies and
experienced practitioner rather whether intervention continues,
than one well-versed in recent thus creating a conflict of interest.
research evidence. This may also lead to bias
tendencies which may affect the
Example, despite EBP-based client’s autonomy.
guidelines, a practitioner decided
to carry on treating a patient who ● Informed Consent
unexpectedly revived and left The idea of informed consent is
hospital relatively well or a surgeon again grounded in the principle of
implemented an intervention. autonomy. This principle respects
Another example, A surgeon the right of a person to weigh the
during a procedure might decide to pros and cons of a decision and to
try something new on the basis of make a choice on the basis of his
strong intuition, even though little or her consideration of alternatives.
or no EBP-evidence exists to To make a fully informed choice,
support it. (BrantZawadzki 2012). potential participants must be
Another is, a new evidence based advised of the expected benefits
treatment may not be effective to and risks.
those who would find it difficult to
establish new routines.

● Client Autonomy C. Ethic-Moral Obligation of the Nurse in


In most cases, patients lose Evidence-Based Practice
choice; they are constrained to
have what the evidence tells them Evidence‐based practice (EBP) is
to, a phenomenon that has been a problem‐solving approach to the
described as evidence-based delivery of health care that integrates the
paternalism. best evidence from well‐designed studies
and evidence‐based theories with a
Patient and family participation in clinician's expertise and a patient's
planning intervention (autonomy) is preferences and values in making the best
an important dimension of clinical decisions (Melnyk &
rehabilitation. This participation Fineout‐Overholt, 2014). Clinical practice
should also include decision guidelines, which should be routinely
making under difficult incorporated into EBP, are statements with
circumstances by the client when recommendations for clinical practice that
competing interests are decided. are rigorously developed based on
systematic reviews of evidence and an
● Conflict of Interest evaluation of their benefits and harms
May be represented when clinical (Melnyk et al., 2012). Guidelines are
trials are subjected to questions important tools in EBP that can reduce
about the validity of their healthcare variation and improve patient
conclusions. Although studies outcomes. However, guidelines produced
designed with high levels of control from multiple sources often conflict with
one another, which can be confusing for Practice guidelines serve
clinicians. Further, many clinicians to:
unknowingly follow recommendations and
guidelines that have not undergone An important milestone in the
rigorous development. formation of the ICH-GCP guidelines was
The Belmont Report which was issued in
April 1979 by the National Commission
a. Introduction to Good Clinical Practice for Protection of Human Subjects of
Guidelines Biomedical and Behavioural Research.
The principles of this report are as
What is a good clinical practice? follows:
Good Clinical Practice (GCP) is an
international ethical and scientific ● Respect for Persons: This principle
standard for conducting biomedical and acknowledges the dignity and
behavioral research involving human freedom of every person. It
participants. requires obtaining informed
It also serves to protect the rights, consent from research subjects (or
integrity and confidentiality of trial their legally authorised
subjects.Today, the ICH-GCP guidelines
representatives)
are used in clinical trials throughout the
● Beneficence: This principle
globe with the main aim of protecting
and preserving human rights.
requires that researchers maximise
Good clinical practice guidelines benefits and minimise harms
should be followed when generating associated with research.
clinical trial data that are intended to be Research-related risks must be
submitted to regulatory authorities. reasonable in light of the expected
benefits.
Evidence‐based practice (EBP) is a ● Justice: This principle requires
problem‐solving approach to the delivery
equitable selection and recruitment
of health care that integrates the best
and fair treatment of research
evidence from well‐designed studies and
evidence‐based theories with a
subjects.
clinician's expertise and a patient's
The current system of Good Clinical
preferences and values in making the
Practice has evolved, in part, in
best clinical decisions (Melnyk &
response to revelations of past episodes
Fineout‐Overholt, 2014). Clinical
in which research participants were
practice guidelines, which should be
grossly abused. Exposure of these
routinely incorporated into EBP, are
incidents, provided much of the
statements with recommendations for
momentum for the development of
clinical practice that are rigorously
regulations and ethical guidelines on the
developed based on systematic reviews
protection of human research
of evidence and an evaluation of their
participants.
benefits and harms (Melnyk et al., 2012).
Guidelines are important tools in EBP Why is GCP training necessary?
that can reduce healthcare variation and
improve patient outcomes. However, This training is important for all staff
guidelines produced from multiple involved in Clinical Research and
sources often conflict with one another, ensures an understanding of the
which can be confusing for clinicians. principles adopted in research.
Further, many clinicians unknowingly
follow recommendations and guidelines ● GCP is widely accepted and
that have not undergone rigorous expected in all research involving
development. human participants.
● GCP is not specific to a protocol,
but rather is general and applicable
to all protocols.

What are the Good Clinical Practice


guidelines?

The Good Clinical Practice (GCP)


guidelines were prepared in association
with the International Council for
Harmonization (ICH). Consolidating
many of the same principles set out in
earlier codes of medical ethics, the GCP
guidelines provide a framework for the
fair, scientifically sound conduct of
research studies involving human
participants.

The purpose of the ICH GCP guidelines


is twofold:

● To ensure that the rights, safety,


and confidentiality of participants in
clinical trials are protected.
● To ensure that the data collected in
clinical trials, as well as the
reported results of clinical trials,
are accurate and credible.

The principles in this guideline may be


applied to all clinical investigations
involving human participants, such as
those involving an investigational
product, a marketed drug, a medical
device, or a behavioral intervention.
VIII. Ethical Consideration in - refers to the ability to discern the
Leadership Management moral good, discern a moral right
from wrong, and must have the
A. MORAL DECISION MAKING standard to measure or compare
the good thing and bad thing.
Leaders are seen as moral persons when What is Moral Discernment?
they demonstrate certain traits, behaviors, - Moral discernment defines the
and decision-making patterns. Critical moral convictions that determine
traits include integrity, trustworthiness, and one’s behavior and ultimately one’s
honesty. The corresponding behaviors life. The person with moral integrity
generally reveal a concern for other can live consistent with convictions
people, openness, and a personal morality or beliefs of themselves.
(Treviño et al. 2000). - Carter (1996) defined the people
that have moral integrity that are
While it is important that these traits and consistent to hold the moral
behaviors be recognized as ethical from principle, conviction.
an external perspective, a leader that - Olson (2002) defined moral
self-identifies as a moral person – discernment refers to the ability to
otherwise known as having a moral discern what is morally right from
identity – will more successfully make morally wrong that requires moral
ethical decisions and influence others to reflectiveness on the meaning of
behave in ethical ways (Mayer et al. 2012) good and bad. It refers to the
ability to draw conclusions from the
Being a moral person is essential to being discernment to develop
an ethical leader, but this quality alone convictions.
does not enable a leader to consistently - Livesey (2012) defined
influence the decision-making of others. In discernment that includes both rule
addition to demonstrating personal knowledge and reasoning.
morality, which means that they make
decisions that can be based from their
moral compass in life which ultimately
defines them, ethical leaders are moral
managers, which means they can manage
moral decisions according to specific
situations.

Moral Development and Abstract


Dilemmas
● PRINCIPLE OF MORAL
DISCERNMENT James Rest (Rest and Narvaez 1994), a
developmental psychologist who studied
What is Discernment? moral and ethical development, identified
four components of moral development:
● Moral sensitivity—the ability to sterilizations-that is, no facility
interpret a situation in moral and could perform sterilizations on the
ethical terms; basis of an institutional policy that
● Moral judgment—the ability to welcomed and sanctioned routine
determine a course of action in the sterilizations.
context of what is just;
● Moral motivation—the ability to 2. Principle of Material
select an appropriate course of Cooperation - when a person's
action among multiple good actions unintentionally help
alternatives; and another person do something
● Moral character—the courage wrong.
and skills to follow a course of
action in response to a situation
Material cooperation simply means that
although we do not share the intention of
The Four Principles of Moral the wrongdoer, we are involved in the
Discernment matter or the actual doing of the action.
● Principle of formal cooperation Thus the distinction between formal and
● Principle of Material cooperation material asks whether we intend, desire,
● Principle of lesser evil or approve the wrong activity. If we do, we
● Principle of double effect are wrongdoers too. If not, then we should
consider the other issues.
1. Principle of Formal Cooperation-
it occurs when someone 3. Principle of Lesser Evil - The
intentionally helps another principle that when faced with
person carry out a sinful act. selecting from two immoral
options, the one which is least
Formal cooperation means that the immoral should be chosen.
person cooperating intends,
desires, or approves the The principle of lesser evil simply states,
wrongdoer's conduct. Thus, for where a person must choose between an
example if the nurse helps in the evil and a greater evil, he must choose the
operation because she wants the lesser. The way one applies this principle
operation performed, if the servant depends on the circumstances, which is a
transports the letters because he philosophical study of its own. In a political
approves of the liaison, if the priest context, there are, generally speaking, two
intends that the sinner receive main circumstances where the principle of
communion, or if the judge lesser evil applies.
applauds the couple's divorce —
then, regardless of any other The first is inside the system, and the
distinctions, the cooperator is also second is outside the system. Until
wrong. We cannot formally circumstances bring about the necessity of
cooperate in morally wrong activity, working outside the system, the people
because we cannot intend wrong must work within the system. In both
conduct. For this reason the cases, the principle of lesser evil applies.
Vatican held that no Catholic
healthcare facility could ever Let’s get a clearer picture of what this
formally cooperate in providing means.
The principle of lesser evil manifests itself ● The Principle of
most clearly when extreme conditions
Well-Formed Conscience
force our choice. For example, the Jews
who were captured and enslaved by - Indicates that people are
Hitler’s regime had to choose between obligated to inform themselves
submission or resistance to tyrants. For about ethical norms, incorporate
most of them, submitting to evil was less that knowledge into their daily lives
evil than having scores, hundreds and , act according to that knowledge,
thousands of Jews mercilessly and and take responsibility for those
immediately killed for resisting or actions.
disobeying. So Ecclesiastes 9:4 says, “a
living dog is better than a dead lion.” What is Conscience?

- A judgement of reason by which the


4. Principle of Double Effect - This human person recognizes the moral
principle aims to provide quality of a concrete act
specific guidelines for
The conscience judges a concrete act as
determining when it is morally
good or evil in accord with a norm of
permissible to perform an action
morality given to it. And this norm is the
in pursuit of a good end in full
natural law.
knowledge that the action will
also bring about bad results. - Represents both the general ability
we have to know what is good and right to
The principle of double effect can be make the concrete judgements we make
outlined briefly as follows. Sometimes the in.
same act causes both a good result and
an evil result at the same time. Can such - This may be affected by: Family,
an act be performed? Environment, School, Church and
individual own biases.
The answer is that it can be, provided that
all the following four conditions - In religion, it is the inner sanctuary in
are met: which we listen to the voice of God.

● First, the act itself must be good or Formation of Conscience


indifferent.
-The dignity of the human person implies
● Second, the good effect must not
and demands the rectitude of the moral
be caused by the evil effect.
conscience, that is, its being based on
● Third, the good effect and not the
truth. One must seriously seek a right
evil effect must be directly intended
conscience or, in other words, one must
by the agent.
try to make sure that one’s moral
● Fourth, there must be a
judgment is right.
proportionality between the good
and evil result (i.e., the good must
- Lifelong process, involving the total
outweigh the evil)
person- one’s reason, emotions,
embodied and social experience,
imagination and intuition.
- It is the comprehensive in the sense -It is important to identify between our
that it enagages the whole person in the subjective self and whats is objectively
pursuit of the true and the good. true outside ourselves.

This can be achieved by: - If there is an incorrect conscience,


that means that the conscience is
● Diligently learning the laws of the erroneous in its view of the truth.
moral life (through spiritual
formation), just as the referee must - “Certain” conscience is that we
be interested in knowing well the believe that our conscience is in
rules of the game, conformity with what is objectively true.
● Seeking expert advice in difficult
cases (spiritual direction), just as B. Invincibly ignorant conscience
doctors hold consultations when
the diagnosis of a serious illness is - Refers to an error of which the person is
not clear, unaware and for which she is not
● Asking God for light (prayer), responsible.
● Removing the obstacles to right
C. Culpably ignorant conscience
judgment, such as habitual moral
disorder, or bad habits (ascetical -Refers to an error which the person is
struggle) responsible.
● Personal examination of
conscience. Rules to follow in obeying one’s
conscience:
The expression formation of one’s
conscience precisely refers to the careful - Always follow a certain conscience
preparation of that judgment.9 A person is
called prudent when he chooses - An incorrect conscience must be
according to that judgment. Among the changed if possible
above-listed conditions for reaching a right
judgment, two can especially benefit from - Do not act with a doubtful conscience
a careful preparation: the intellect’s
- Obey certain judgments of our
knowledge of moral laws, and the will’s
conscience, realizing that our conscience
removal of obstacles. Thus, the formation
can be incorrect
of one’s conscience is a long and
comprehensive process that will later
facilitate an immediate and right judgment
● STRATEGIES OF MORAL
in any concrete situation.
DECISION MAKING PROCESS
1. Recognizing your
Types of Conscience:
circumstances
A. Good Conscience
Thinking about origins of the
-Makes judgements that conform to problem, individuals involved, and relevant
reason and the good that is willed by the principles, goals & values; considering
Wisdom of God. one’s own role in causing and/or resolving
the problem.
2. Seeking outside help ● Identify the obligations
Talking with a supervisor, peer, or (principles, rights, justice)
institutional resource, or learning from ● Consider your character and
others’ behaviors in similar situations. integrity
● Think creatively about potential
3. Questioning your own and actions
others’ judgment ● Check your gut
● Decide on the proper ethical
Considering problems that people action and be prepared to deal
often have with making ethical decisions, with opposing arguments
remembering that decisions are seldom
perfect. ETHICAL DILEMMA

4. Dealing with emotions ● Also known as ethical paradox


● A problem in the
Assessing and regulating decision-making process
emotional reactions to the situation. ● between two possible options,
neither of which is absolutely
5. Anticipating consequences of
acceptable from an ethical
actions
● perspective.
Thinking about many possible ● Extremely complicated
outcomes such as consequences for challenges that cannot be easily
others, short & long term outcomes based solved.
upon possible decision alternatives. ● Involves unclear choices of what
is right and what is wrong
6. Analyzing personal motivations
Ethical values usually arise as a result
Considering one’s own biases, of dilemmas between four sets of
effects of one’s values and goals, how to values:
explain/justify one’s actions to others, &
questioning ability to make ethical - Societal Values: The law
decisions. - Corporate Values: Principles of
the organization where the
7. Considering the effects of individual works
actions on others - Personal Values: Principles of
self
Being mindful of others’ - Professional Values: The values
perceptions, concerns, and the impact of and principles of the
your actions on others, socially and professional body
professionally.
SPOTTING AN ETHICAL DILEMMA:
STEPS OF MORAL DECISION MAKING
PROCESS - An issue of integrity
- Professional competence
● Gather the facts - Confidentiality: to be maintained
● Define the ethical issues - Conflict of interest
● Identify the affected parties - Objectivity
● Identify the consequences
Conditions: norms and traditions, and the quality and
appropriateness of the services provided.
1. Agent must make a decision
about which course of action is Solutions were implemented and one
best. example is Value-based healthcare, also
2. There must be different courses known as value-based care, is a payment
of action to choose from. model that rewards healthcare providers
3. No matter what course of action for providing quality care to patients.
is taken, some ethical principle Under this approach, providers seek to
is compromised. In other words, achieve the triple aim of providing better
there is no perfect solution. care for patients and better health for
populations at a lower cost.
APPROACHES TO SOLVE AN ETHICAL
DILEMMA Value-based care focuses on care
coordination that ensures patients are
1. Refute the paradox: The
given the right care by the right provider at
situation must be carefully
the right time. Thus, in a value-based
analyzed. In some cases, the
healthcare model, physicians may
existence of the dilemma can be
collaborate with each other on a patient's
logically refuted.
care, rather than making decisions
2. Value theory approach: Choose
separately that can lead to gaps or
the alternative that offers the
overlaps in care.
greater good or the lesser evil.
3. Find alternative solutions: In
ALLOCATION OF HEALTHCARE
some cases, the problem can be
SERVICES
reconsidered, and new
alternative solutions may arise.
When resources are limited and demand
exceeds supply, allocation becomes a
problem.These considerations apply to
B. MEANING AND SERVICE healthcare as much as they do to anything
else.
VALUE OF MEDICAL CARE
-The gap between supply and demand not
only contributes to a delay in meeting Policies for allocating scarce health care
patients' needs, but it can also be resources can impede their ability to fulfill
expensive and generate waste in the that obligation, whether those policies
system. The experience of many health address situations of chronically limited
care organizations demonstrates that resources, such as ICU (intensive care
demand is not really insatiable, but unit) beds, medications, or solid organs for
actually predictable transplantation, or “triage” situations in
times of scarcity, such as access to
Demand for health care is characterized ventilators during an influenza pandemic.
by the level of actual consumption of an
individual incase of facing illness/injury, Individually and collectively through the
this consumption could differ in profession, physicians should advocate for
accordance with demand factors such as policies and procedures that allocate
income, cost of care, education, social scarce health care resources fairly among
patients, in keeping with the following ● Resources spent on healthcare have
criteria: increased over the
last century. Americans are spending far
A. Base allocation policies on criteria more resources
relating to medical need, including on healthcare than do citizens of any other
urgency of need, likelihood and industrialized
anticipated duration of benefit, and nation. Why?
change in quality of life. - Continued medical advances have led to
B. Give first priority to those patients more accurate diagnoses and better
for whom treatment will avoid treatments, but also have increased the
premature death or extremely poor cost of healthcare.
outcomes, then to patients who will - The aging population is growing. Nearly
experience the greatest change in 36 million Americans (more than the entire
quality of life, when there are very population of Canada) are age 65 or older
substantial differences among and account for a majority of healthcare
patients who need access to the expenditures.
scarce resource(s). - More people are living with chronic
C. Use an objective, flexible, disease and disabilities, including AIDS.
transparent mechanism to
determine which patients will Access to Health Services
receive the resource(s) encompasses three components:
D. Explain the applicable allocation 1. Coverage
policies or procedures to patients ● Health insurance coverage helps
who are denied access to the patients gain entry into the
scarce resource(s) and to the healthcare system. Lack of
public. adequate coverage makes it
difficult for people to get the health
care they need and, when they do
ISSUES INVOLVING ACCESS TO CARE
get care, burdens them with large
- Access to health services means "the
medical bills. Uninsured people
timely use of personal health services to
are:
achieve the best health outcomes." It
■ More likely to have poor health status
requires
■ Less likely to receive medical care
■ More likely to be diagnosed later
Three distinct steps: ■ More likely to die prematurely
● Gaining entry into the healthcare
system (usually through insurance 2. Services
coverage) ● Improving access to health care
● Accessing a location where needed services depends in part on
health care services are provided ensuring that people have a usual
(geographic availability) and ongoing source of care (that
● Finding a health care provider whom is, a provider or facility where one
the patient trusts and can communicate regularly receives care). People
with (personal relationship) with a usual source of care have
better health outcomes, fewer
Why Is Resource Allocation Needed? disparities, and lower costs.
Rising Cost of Healthcare ● Having a usual Primary Care
Provider is associated with:
■ Greater patient trust in the provider ● High cost of care
■ Better patient-provider communication ● Inadequate or no insurance coverage
■ Increased likelihood that patients will ● Lack of availability of services
receive appropriate care ● Lack of culturally competent care
■ Lower mortality from all causes ● Access to care also often varies based
● In addition to primary care and on race, ethnicity, socioeconomic status,
preventive services, emergency age, sex, disability status, sexual
medical services (EMS) are a orientation, gender identity, and residential
crucial link in the chain of care. location.
EMS include basic and advanced These barriers to accessing health
life support. Notable progress has services lead to:
been made in recent years to ● Unmet health needs
ensure that everyone has access ● Delays in receiving appropriate care
to rapidly responding EMS; it is an ● Inability to get preventive services
● important effort in improving the ● Financial burdens
health of the population. ● Preventable hospitalizations
3. Timeliness
● The health care system's ability to Responses and Attempted Solutions to
provide health care quickly after a the Problem of Limited Healthcare
need is recognized. Measures of Resources Since health is valued very
timeliness include: highly in American society, There have
■ Availability of appointments and care for been many attempts to reform the system.
illness or injury when it is needed. These reforms have attempted to either
■ Time spent waiting in doctors' offices increase the financial resources directed
and emergency departments (EDs). to healthcare or to use limited resources in
● The delay in time between the best way possible. Reform attempts
identifying a need for a specific test have included efforts to:
or treatment and actually receiving ● Increase efficiency. By curtailing waste
those services can negatively and unnecessary care, providers can be
impact health and costs of care. more efficient. Methods include evaluating
For example, delays in getting care health technologies and expanding
can lead to: prevention programs.
■ Increased emotional distress ● Distribute resources equitably. The
■ Increased complications basis of distribution is value-based and
■ Higher treatment costs can take many forms: strict equality,
■ Increased hospitalizations access to a determined level of care,
● Actual and perceived difficulties or access to an equal opportunity for care,
delays in getting care when limiting access to people responsible for
patients are ill or injured likely their health problems, and access based
reflect significant barriers to care. on age or other factors.
Prolonged ED wait time:
■ Decreases patient satisfaction ● Adopt managed care plans. Managed
■ Increases the number of patients who care has been offered as an
leave before being seen organizational structure that hopes to
■ Is associated with clinically significant distribute healthcare resources more
delays in care efficiently and wisely by having physicians
review policies that balance the healthcare
Barriers to Health Services include: of the individual patient (and the cost of
caring for that patient) with the goals and
costs of providing healthcare to the entire
group.

You might also like