You are on page 1of 12

Health Information System

WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
ETHICS, PRIVACY, AND SECURITY  If we go to the hospitals, we can see
different machines that are being used to
TOPIC OUTLINE treat the patients
1 Ethics in Health Informatics
2 Privacy, Confidentiality and Security Measures  We also see computers and information
In Health Care systems
3 Data Privacy Act

 The technology has greatly benefitted the


HEALTHCARE INFORMATICS healthcare professionals, especially on the service
delivery

 Because of this advent of technology, the


healthcare sector has a lot of things to consider. They
now have to think of informatics

HEALTHCARE INFORMATICS
 Healthcare informatics covers issues on
honorable actions, proper and improper
behaviors in the field of healthcare

 In the picture, it can be seen that the Healthcare


and Ethics are overlapping

 Even from before, issues concerning ethics, LEGAL CONCERNS REGULATORY REQUIREMENTS
prvacy and security have long been common in
medicine, research, psychology and other areas  With this advancing world, the healthcare sector
and fields also needs to adapt such as integrating informatics into
their system
 Whenever we deal with humans, Ethics is always
there. We always have to consider ethical issues
 But even with the selection of the proper informatics
tools can give us a lot of issues to deal with

THINGS THAT ARE NEEDED TO BE CONSIDERED


THE KIND OF INFORMATICS TOOLS TO BE USED
 The kind of informatics system will the hospital
acquire

USERS OF THESE TOOLS


 The hospital also needs to hire people who will be
using this system

EVALUATION, DEVELOPMENT, MAINTENANCE


 Right now in this modern world, we now have  The hospital will have to pay for the maintenance
informatics involved and this made the venn of the system
diagram much more complicated
COMPUTERS IN TRACKING
 Technology helped in the modernization of the  Buying hardwares to help in tracking the system
helathcare industry, but it made it a lot MORE
complicated

 It did help us healthcare professionals to be  We are just talking about the finances and the
dependent on the use of mechanical aids in logistics, but we also have to deal with the concern of
providing patient treatment keeping these data secured

1
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ

ETHICAL PRINCIPLES FOR INFORMATICS


HEALTH INFORMATICS ETHICS
Before we will buy or secure informatic tool or system,
we have to see if:

EFFICIENCY ON PERFORMANCE AS WELL AS


EFFECTIVENES IN FINANCIAL & TIMEFRAME COST
 Will it benefit us financially in the long run?

 Is the timeframe cost already too high?

TRAINING OF USERS PRIOR TO IMPLEMENTATION


 We need to hire some people. Of course, training
the healthcare practitioners who will use the system

 One will pay for the training


3 MAIN ASPECTS OF HEALTH INFORMATICS
QUALIFIED PROFESSIONALS TO MANAGE ETHICS
CONCERNS GENERAL ETHICS
 One will have to hire qualified professionals to  Guide the reasoning and decision-making of all
manage the different concerns people in organization involved in healthcare

 Here, IT personnels are included in the list of PRINCIPLE OF AUTONOMY


people to be hired in order to manage the system  Autonomy is freedom
 We need to hire a lot of people because even  The idea of allowing individuals to make their
though we are buying a very technologically- own decisions, in response to a particular societal
advanced software, but the software should never context or being free from external influence or
replace the functions of the humans or our control
healthcare professionals
 For the patient, they have control to his/her
 This includes the function of decision-
decisions
making
 In the hospital settings, the patient
should have freedom and control to
 In an ideal clinical setting, information systems are choose what kind of healthcare service
involved. This stores the patients’s records and through he/she will acquire
it, can be retrieved when needed
 For the informatics side, the patient has
 These records assist in the dispensation of control and freedom over their own personal data
healthcare or other supplementary services which are
part of health informatics  For example in the EHR, it contains the
personal data of the patient and these
 Health informatics is needed by health information data are sensitive.
ethics, defined as the application of principles of
ethics in the domain of health informatics  We must respect the patient and uphold
the principle of autonomy by keeping
restrictions about the access, content,
and ownership of these records

 Sometimes, when the patients are given too


much control over their data or EHRs, this could
defeat the purpose because the patients might
modify certain informations without the health
professionals’ knowledge

2
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ

 With this, there should be a compromise All data should have multiple back-ups for fast and
easy recovery
 It is best that these records are being used by
the healthcare professionals, but still upholding These data should be equipped with the highest level
the principle of autonomy by limiting the patients’ of security
control over their own records
 We have to protect these data because if
 We still give them access and control, we don’t protect these data, then we might
but only on verification purposes (to break the principle of non-maleficence
verify the records are correct)
INFORMATICS ETHICS
 This improves the overall quality of the  Informatics ethics is about the behavior expected
document but still preserving the principle of from an individual assigned to handle information
autonomy
PRINCIPLE OF INFORMATION PRIVACY AND
PRINCIPLE OF BENEFICENCE DISPOSITION
 Beneficence is for the good  Everyone has the fundamental right to privacy

 This mostly relates the usage of thorough data  Every individual should ensure that he/she has
in the EHR system control over the collection, access, use,
communication, manipulation, storage, linkage
 When we use this data, this information is for and disposition of data about himself/herself
the good of the patient, or even for the good of the
society when we use this information to do some  If you are the owner of a certain data, then you
researches, which can develop the community, have a fundamental right to privacy of the data
produce the new knowledge that we can apply in
the world of healthcare PRINCIPLE OF OPENNESS
 Talks about the control measures of particular
 Then, we are doing something good with data
the information. We are preserving the
principle of benevolence  Should be disclosed to the concerned
individuals in an appropriate or timely fashion
PRINCIPLE OF NON-MALEFICENCE
 To do no harm  If you collected a certain data, then you should
be open to that person on what will happen to the
 Mostly, this will be talking about how we are data
protecting the data we collect so that there will be
no harm that will happen  You will inform the person as to where
you will store it, manner of
 The EHR contains data and that data can be destroying/disposing it, or control
used in various ways for the good of the various measures that one will do to the data.
people, not only the patient This should be open to the patient or to
the person
 If we use the patient’s data for research
purposes, consent should also be needed and PRINCIPLE OF SECURITY
given  Legitimate collecting of data should be
protected in all appropriate measures against
 Since we are living in an advanced world, access, use, modification, communication,
soemtimes we are too dependent on technology manipulation, linkage, loss, derivation, and
and this can be a way in which threats or carious unauthorized destruction
lapses can occur, which can lead to doing harm,
violating non-maleficence  If you collected these data, then you should
make sure that these data is secured by putting
 Examples: temporary power outages, which up security measures
can sometimes stop the flow of the hospital

3
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ

PRINCIPLE OF ACCESS  By the time you will become interns, you


 Authorized individuals should be given access will be having duties in hospital. Blood
to electronic health records and the right to bank, one of the departments in the
correct the data with respect to their laboratory, sometimes you will be asked
completeness, accuracy, and relevance to screen donors. You will screen these
donors by interviewing them (you will
 If you are the patient and you are giving your get information from them). There is a
doctor access to your data, it should only be that questionnaire that is needed to be asked
doctor and all healthcare professionals that are to the donors.
handling you
 Because of which, you have a legitimate
 Healthcare professionals that are not handling reason to infringe on their privacy
because you are interviewing them for
your case should not access your data
donor screening
 That is why the keywords here are
 You are dealing with sensitive
authorized individuals. Meaning, these
information such as HIV and sexual
people are given authority to access
practices. However, you are authorized
your data
to get those data because you have a
reason
 In the hospital, if they want to use the
information system, they need to have
PRINCIPLE OF LEAST INTRUSION / LEAST
credentials, username, and password. Only those
INTRUSIVE ALTERNATIVE
username and password can operate the system
 Any infringement of privacy rights should
occur in the least intrusive manner and with the
 Not all personnel in the hospital has that
least amount of interference with the rights of the
username and password
affected parties
 Workers and different departments have their
own username and password and can only have
 You are gonna break someone’s privacy
because you have a legitimate reason to do so,
their own access
then you should only get the data that you are in
concern with that you are needing
 For example as a MedTech who have
his/her own username and password,
he/she have access to almost entire LIS.  You don’t touch, collect, or pick a data that are
However, the doctor who has his own not concerned to you or you are not needing
username and password, he only has
limited acces to LIS.  Going back to the intern example, you
will conduct an interview to these
PRINCIPLE OF LEGITIMATE INFRINGEMENT donors. You have a lkst of questions or
questionnaire. You should stick to those
 The right to privacy and control over personal questions and you should only get the
data should be conditioned by the appropriate,
data that those questions are asking for.
legitimate, and relevant data requirement of a
You should not ask added questions that
democratic society and by the equal rights of
you want
others
 As mentioned, it contains sensitive
 If you are gonna break the principle of privacy information such as the number of
of someone, if you are gonna collect your data sexual partners. You should only for th
possibly without their consent, then you should number and not the names of the sexual
have a legitimate reason for collecting these data partners

 Most common example would be court  As future MedTechs, you should be


cases, legal proceedings in which you confident and be direct in asking the
might be asked to hand over these data. questions. Do not be awkward on some
So you are violating another person’s certain questions since the donors are
privacy. But it is needed becauuse you expecting that you will ask them these
have a legitimate reason to do that type of questions

4
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ

PRINCIPLE OF ACCOUNTABILITY  If they are making machines, it should be up to


 Any infringement must be justified to the the professional’s standards. They should
concerned individual in a timely and appropriate evaluate these machines before selling them
fashion
PROFESSION
 With great power comes with great
responsibility. If you are given the power to collect  The developers when they are making these new
these data, then you should have responsibility tools and new systems, they should have the best
over these data interest of the society in mind

 Any infringement of these data, you should tell  They should be honest and disclose any threats
the concerned individual. You should be or no defects in their software. They should be
accountable on the data you have collected straightforward to the limitations of their product
because if they are only concerned with financial
gains in selling these products, then they are
violating the software ethics
SOFTWARE ETHICS
 Health informatics ethics relies on the use of  In the health institution, it is not only the
softwares to store and process information healthcare institution employees that have to follow
ethics, also those who develop machines, systems,
 With that, the developers of the softwares or the and tools for these people (society, institution,
makers of the softwares of the different companies, employees)
they have an effect on the end users

 These software developers will also have to follow


their own software ethics. They have their own THOUGHTS TO PONDER
ethical duties and responsibilities as software
developers, as software makers, as software Is ethics flexible?
engineers to the stakeholders (which is us) How is EHR different from other informatics records?
HIMP vs other informatics specialists?
THIS INCLUDES
SOCIETY  EHR contains more sensitive data than informatics
 The general society community records (e.g. grade sheets)

INSTITUTION AND EMPLOYEES  HIMP (Health Information Management


 The ones that will use the software Professionals) deals more with sensitive data than
informatics specialists (e.g. teachers)
 Deals more on the developer’s side  With this, the HIMP has more on their plates.
They have more ethical issues to follow or
 They should build these tools, build these consider when making decisions
machines and systems that are helpful to the
institutions and employees. That are easy to use
by the employees
PRIVACY, CONFIDENTIALITY AND SECURITY
 Not all employees in the hospital are IT people.
PRIVACY
The doctors, nurses, MedTechs will still us the
system, but they might not be as knowledgeable  How many people are involved
as the IT
 In privacy, only one person or party is involved
 As much as possible as part of their
software ethics, they should create tools  For example, you have a secret information
that are easy to use by the hospital that you don’t want others to know. You
employees have the right to your own privacy

 Privacy generally applies to individuals under a


version to eavesdropping because you don’t want

5
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
other people eavesdropping, knowing that secret PUBLIC HEALTH
information  If we preserve or uphold privacy and
confidentiality, then public health is also benefitted
CONFIDENTIALITY because people are not anymore afraid to seek out
 Confidentiality involves more than one person professional assistance when they are having
problems.
 You entrusted another person or party with
your secret infromation  They are more likely to seek professional help,
especially in terms with their health
 Atleast two people knows your secret information
 For illness, they are more likely to go to the
 For example in a hospital, you are the hospital that they trust than go to hospital
patient and you are giving personal data to that they don’t trust because it will break
this hospital. That is now confidentiality their confidentilaity
since there are two parties that are
involved (you and the hospital)  More common with the COVID-19 situation.
Some people are more apprehensve to go
 On the side of the hospital since they are to the hospital because maybe they will be
the second party, they should also try to judged or there will be people who will know
protect this information because this is part that they are COVID positive
of your confidentiality
 That is why upholding confidentilaity is important
 Confidentiality is more closely related to the because it actually also helps the general public
unintended exposure to information because your health
information is now at the hands of another party
 When patients trust their healthcare
SECURITY professionals, then they will have a more holistic view
 Those are the measures that we do to protect our of the patient’s overall health
privacy and to protect our confidentiality
 Both the healthcare professionals and the
patient can formulate more informed
decisions
WHY DO WE NEED TO PROTECT OUR PRIVACY
AND CONFIDENTIALITY

IT IS A BASIC HUMAN RIGHT WHAT HAPPENS IF WE BREAK PRIVACY AND


CONFIDENTIALITY?
 People deserves their privacy and confidentiality
with merit respect, without the need to be earned,
argued, or defended HEALTHCARE ORGANIZATION
 On the healthcare organization part, there will be
TRUST consequences such as a decrease in the reputation,
 Preserving privacy and confidentiality in the even financial harm and personal harm to the
healthcare setting establishes trust between our patients
patients and the healthcare practitioners
 The healthcare organization can also be sued
 There is trust if the patients are very comfortable
in sharing their sensitive data to the healthcare  Poor privacy and security practices heightened
practitioners. Then the healthcare practioners can the vulnerability of the patient information and
treat their patients better since we get more increases the risk of successful cyber attacks
information from them
 The most vulnerable part is the patient
 This establishes patient and healthcare provider
relationship and the healthcare professionals can do  As part of the healthcare organizations, they
their jobs better need to do their best to have strict security measures
to protect their data

6
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
 Since they trust them, so the health care  If we are protecting something tangible, then
organzations should deliver service to them those are part of the physical safeguards
the best of their capabilities
 It does not only iclude your computers and your
hardwares, but also the very building or office itself

EXAMPLES
SAFEGUARDS
 Office alarm systems
 Part of security measures Locked offices containing computing
 equipment that store electronic health
 Safeguards are solutions and tools, which may be information
utilized to implement security policies at different levels Security guards
of health organization such as administrative, physical, 
and technical  To guard the building

ADMINISTRATIVE SAFEGUARDS
 We are talking about the measures implemented TECHNICAL SAFEGUARDS
by the management as organization-wide policies  If we are protecting something not tangible such
and procedures as the software, then we are now implementing
technical safeguards, which protects the software
 We are talking about policies, procedures, rules, and database access and control
and protocls that the administration implements, to
be followed by the institution. They are  Anything about putting security into the software
administrative safeguards (usernames, passwords, installing firewalls)

EXAMPLES  This type of safeguards is restricted by the law


Continual risk assessment of your health IT
 environment  Sometimes, we can’t get this type of
Continual assessment of the effectiveness of safeguard, a certain brand of firewall, or a
safeguards for electronic health information certain brand of security system since the
 law does ot allow that
 This improves your security
 Organizations also have to consider the cost-
Detailed processes for viewing and benefit principle
 administering electronic health information
Employee training on the use of health IT to  If they buy the system, can they manage
appropriately protect electronic health financially? If not, then they will just have to

information find another alternative way. If this
happens, the employee and manpower will
Appropriately reporting secuirty breaches have to sacrifice or do some extra work
(e.g., to those entities required by law or because the administration cannot buy the
 contract) and ensuring continued health IT system that will do the work for them
operations
 If the organization has the money or has the
capability to buy very advanced security
system, then that puts the employees and
PHYSICAL SAFEGUARDS
manpower in a more comfortable position
 Mechanisms used to protect equipment, as they don’t have to exert extra effort
systems, and locations

 What is common among equipment, systems, EXAMPLES


and locations is that they are physical things Securely configured computing equipment
 (e.g., virus checking, firewalls)
 To put it simply, they can be touch or they
are tangible

7
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ

Certified applications and technologies that both physically and


 store or exchage electronic health logically
information
Accesss controls to health IT and electronic
Enabling access for
 health information (e.g., authorized
health care providers
computer accounts)
only to information
 Encyption od health IT operations essential to the
 Auditing of health IT operations performance of their
Health IT backup capabilities (e.g., regular jobs and limiting the real
or perceived tempation
 bckups of electronic health information to
another computer file server to access information
beyond a legitimate
need

 If you are also


 The organization has to monitor the effectiveness of CONTROLLING authorized to
safeguards in place and regularly assess the health IT ACCESS access this
environment to determine if new risks are present system, you
are only
 If we are a bit too relaxed that we don’t keep allowed to view
up-to-date to newest trends or practices that those
we don’t know anymore that there are new information
that are
risks already that are rising, then we are also
concerning to
compromising our security
you. You
cannot view
the records of
NATIONAL RESEARCH COUNCIL other patients

 The National Research Council (1997) emphasizes


Ensuring that recrd
that technological security tools are essential
owners, data stewards
components of modern distributed health care
and patients understand
information systems, and that they serve five key COMPREHENSIBILITY and have effective
functions: AND CONTROL control over appropriate
aspects of information
FIVE KEY ELEMENTS and access
Ensuring that accurate
and up-to-date
AVAILABILITY information is available
LABORATORY DEPARTMENT
when needed at
appropriate places
 In the laboratory, we deal a lot of data and
Helping to ensure that information
health care providers
are responsible for their  We deal with patient’s data, we receive data
ACCOUNTABILITY access to and use of from the patients, but we also generate data
information, based on a through the results of our tests
legitimate need and
right to know INFORMATION FLOW OF THE LABORATORY
REGISTER PATIENT
Knowing and controlling  Patient sample (e.g. ID Number, name, sex,
PERIMETER the boundaries of age, location) must be created in the LIS before
IDENTIFICATION trusted access to the tests can be ordered. LIS usually automatically
information system, receives these data from a hospital registration
system when a patient is admitted

8
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ

 If you have an effective LIS system, then that  Upon receiving the sample, the LIS will be
actually makes your job or the laboratory more updated from “collected” to “received” and
secured this is just done by scanning the barcode

 Instead of having a manual way wherein the  After you collect blood in your collection
patient will write in the paper for his/her personal tubes, you put your barcodes on the
records, the paper will have a chance of getting lost selection tubes
and the chance of the paper that will go into the
wrong hands RUN SAMPLE
 The sample is loaded onto the analyser, and the
ORDER TESTS bar code is read. Having already received the test
 Physician order tests on a patient to be draw as order from the LIS, the analyser knows which tests to
part of the laboratory’s morning blood collection perform on the patient. No work list is needed. For
rounds. The order is entered into the CIS and manually performed tests, the technologist prints a
electronically sent to the LIS work list from the LIS. The work list contains the
names of the patients and the tests ordered on each.
 Upon ordering tests, the physician can just Next to each test is a space to record the result.
use the CIS and electronically send the
request to the LIS directly  When we are running our tests, we will still
use the barcode.
COLLECT SAMPLE
 If you are having a very highly
 Before morning blood collection, the LIS prints a
comprehensive LIS that is integrated to
list of all patients who have to be drawn and the
your laboratory including your different
appropriate number of sample barcode labels for
machines, so just by attaching the barcode
each patient order. Each barcode has a patient ID,
alone to your sample, the machine will
sample contained, and laboratory workstation that
already know what test to run rather than
can be used to sort the tube once it reaches the
manually inputting the request
laboratory. Another increasingly popular approach
is for patient caregivers or nurses to collect the blood
 This makes our job easier and also
sample. Immediately prior to collection, sample
improves security
barcode labels can be printed (on demand) at the
nursing station on an LIS printer or portable bedside
 Lesser chance of people seeing the
printer
information since there is no more worklist
 Upon collecting a sample, the LIS will just
REVIEW RESULTS
print as a copy of all request slips
 The analyser produces the results and sends
 Instead of writing the patient’s details, we them to the LIS. These results are only viewable to
will just use the barcodes so the patient’s technologists because they have not been released
information are now just stored for general viewing. The LIS can be programmed to
electronically. We need the barcode so that flag certaiin results – for example, critical values – so
we will just access them in the LIS rather the technologist can easily identify what needs to be
than writing everything like a patient ID, repeated or further evaluated
sample contained, and laboratory
workstation in the request slip  There is a term such as flagging, in which
the machine and the LIS, if the result is too
 If you are collecting blood from a patient, high or too low, will flag and will notify the
verify the name of the patient MedTech of these values (critical values –
too high/too low) and inform the physician
RECEIVE SAMPLE immediately
 When the samples arrive in the laboratory, their
 In hospitals, critical values is also known as
status has to be updated in the LIS from “collected”
panic values wherein if the patient have the
to “received.” This can be done by scanning each
panic values, the MedTech will call the
sample container’s barcode ID into the LIS. Once the
physician right away
sample is “received,” the LIS transmits the test order
to the analyser who will perform the test

9
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
RELEASE RESULTS Periodic review of standards in identifying
 The technologist releases the results. Unflagged  which results should be flagged
results are usually reviewed and released at the
Strengthen laboratory authorization and
same time. The LIS can also be programmed to
 supervision policies
automatically review and relese normal results or
results that fall within a certain range. The latter Implement strict rules and regulations
approach reduces the number of tests that a  regarding the testing procedures
technologist has to review. Upon release, the results
are automatically transmitted to the CIS. Release guidelines on proper disposal of
 laboratory specimen
 Even with the use of machine and with a Enforce policies on the proper use of
very comprehensive and effective LIS, the  laboratory workstations
MedTechs has to review the results,
especially if there are flagging or abnomrla  Impose disciplinary measures as needed
results

 If the results are normal, the machine will PHYSICAL SAFEGUARDS


release the result
 We are protecting physical or tangible things
such as machines and equipments
REPORT RESULTS
 The physician can view the results on the CIS  The laboratory itself is our office or area and
screen. Reports are printed when needed from the
anything that protects it are physical safeguards
LIS.

 Upon reporting results, the physician can


EXAMPLES
just view the results on the CIS
Periodic maintenance of laboratory
 equipment
 The LIS will generate and report the results
directly to the CIS as long as the physician Biometrics or other security protocl for
has the right credentials to access the CIS
 laboratory access
Controlled temperature both for equipment
 The physician has the username and the  and specimen
password so that he/she can use the CIS
 Contingency operations plan
 The MedTech has the username and Use of appropriate personal laboratory
password, but only on the LIS. The  safety equipment
MedTechs only have limited control and
access

 Employees having limited control and TECHNICAL SAFEGUARDS


access improves security. Too much power  Protect the softwares
on one individual can actually be
detrimental EXAMPLES
Automated identity confirmation
 procedures for users requesting access
 Regular change of username and password
SAFEGUARDS FOR THE LABORATORY
INFORMATION SYSTEM Different access capabilities based on user
 position
ADMINISTRATIVE SAFEGUARDS Automatic log-off after long periods of
 Protocols, rules, procedures that the inactivity
administration implements for the employees to 
follow  So that when somebody enters the
lab, they cannot use it with your
EXAMPLES credentials
Continuous eployee training on the use of
 the LIS

10
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ

 Yes there are. In legal proceedings in which we


DATA PRIVACY ACT OF 2012 (REPUBLIC ACT OF are askd to give information, pursuant to law that
10173) does not required consent

CHAPTER 1, SECTION 2  In public health, necessity to protect life and


 It aims to protect the fundamental human health of a person. If you as a healthcare provider
right of privacy of communication while ensuring knows that doing this will help save your patient,
free-flow of information to promote innovation then you can do so without consent also in times
and growth of national emergency

 If the benefit of proceeding to this step or doing


 This applies to all individuals and legal entities this is far greater, then the act of violating the
that are in the business of processing personal person’s privacy by not getting his/her consent,
information then it it okay

 In the healthcare setting, we are a part of this

 Applies to both companies with offices in the


Philippines, and even to those situated–outside that SENSITIVE PERSONAL INFORMATION
use equipments based in the Philippines
Race, ethnic origin, marital status, age, color,
 This covers personal information of Filipino 1 and religious, philosophical or political
citizens, regardless the place of residence affilations
Health, education, genetic or sexual life of a
 The main principles that govern the approach for person, or to any proceeding for any
this act includes transparency, legitimacy of offensecommitted or alleged to have been
purpose,and proportionality 2 committed by such person, the disposal of such
proceedings, or the sentence of any court in
CONSENT such proceedings
 Consent is important
Information issued by government agencies
peculiar to an individual which includes, but not
 Consent is one of the major elements and is limited to, social security numbers,previous or
being highly valued
3
current health records, licenses or its denials,
suspension or revocation, and tax returns
 The acts provides that consent must be
Information specifically established by an
documented and given prior to the collection of
4 executive order or an act of Congress to be
any form of personal data
kept classified
 The collection must be declared, specified, and
used only for legitimate purpose
KEY POINTS TO REMEMBER
 In addition, the data subjects must be notified
about the purpose and extent to data processing,  Health Informatics ethics is the application of the
mediating speciying the need for automated principles of ethics to the domain of health informatics
processing, profiling, direct marketing or sharing (General Ethics, Informatics Ethics, Software Ethics)

 We are upholding the principle of openness  General Ethics cover Autonomy, Beneficence, Non-
that we should be open to our data subjects to our Maleficence
patients on how their data will be handled
 Informatics Ethics refers to Privacy, Openness,
 These factors ensured that consent is freely Security, Access, Infringement, Least Intrusion and
given, specific, and informed
Accountability
Are there exceptions or cases in which it is
okay not to have consent?

11
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ

 Software developers should consider the best


interest of the society in general, institution and its
employees and the profession

 Administrative, Physical and Technical safeguards


are placed regularly to monitor effectiveness and
access the health IT environment.

12

You might also like