Professional Documents
Culture Documents
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
ETHICS, PRIVACY, AND SECURITY If we go to the hospitals, we can see
different machines that are being used to
TOPIC OUTLINE treat the patients
1 Ethics in Health Informatics
2 Privacy, Confidentiality and Security Measures We also see computers and information
In Health Care systems
3 Data Privacy Act
HEALTHCARE INFORMATICS
Healthcare informatics covers issues on
honorable actions, proper and improper
behaviors in the field of healthcare
Even from before, issues concerning ethics, LEGAL CONCERNS REGULATORY REQUIREMENTS
prvacy and security have long been common in
medicine, research, psychology and other areas With this advancing world, the healthcare sector
and fields also needs to adapt such as integrating informatics into
their system
Whenever we deal with humans, Ethics is always
there. We always have to consider ethical issues
But even with the selection of the proper informatics
tools can give us a lot of issues to deal with
It did help us healthcare professionals to be We are just talking about the finances and the
dependent on the use of mechanical aids in logistics, but we also have to deal with the concern of
providing patient treatment keeping these data secured
1
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
2
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
With this, there should be a compromise All data should have multiple back-ups for fast and
easy recovery
It is best that these records are being used by
the healthcare professionals, but still upholding These data should be equipped with the highest level
the principle of autonomy by limiting the patients’ of security
control over their own records
We have to protect these data because if
We still give them access and control, we don’t protect these data, then we might
but only on verification purposes (to break the principle of non-maleficence
verify the records are correct)
INFORMATICS ETHICS
This improves the overall quality of the Informatics ethics is about the behavior expected
document but still preserving the principle of from an individual assigned to handle information
autonomy
PRINCIPLE OF INFORMATION PRIVACY AND
PRINCIPLE OF BENEFICENCE DISPOSITION
Beneficence is for the good Everyone has the fundamental right to privacy
This mostly relates the usage of thorough data Every individual should ensure that he/she has
in the EHR system control over the collection, access, use,
communication, manipulation, storage, linkage
When we use this data, this information is for and disposition of data about himself/herself
the good of the patient, or even for the good of the
society when we use this information to do some If you are the owner of a certain data, then you
researches, which can develop the community, have a fundamental right to privacy of the data
produce the new knowledge that we can apply in
the world of healthcare PRINCIPLE OF OPENNESS
Talks about the control measures of particular
Then, we are doing something good with data
the information. We are preserving the
principle of benevolence Should be disclosed to the concerned
individuals in an appropriate or timely fashion
PRINCIPLE OF NON-MALEFICENCE
To do no harm If you collected a certain data, then you should
be open to that person on what will happen to the
Mostly, this will be talking about how we are data
protecting the data we collect so that there will be
no harm that will happen You will inform the person as to where
you will store it, manner of
The EHR contains data and that data can be destroying/disposing it, or control
used in various ways for the good of the various measures that one will do to the data.
people, not only the patient This should be open to the patient or to
the person
If we use the patient’s data for research
purposes, consent should also be needed and PRINCIPLE OF SECURITY
given Legitimate collecting of data should be
protected in all appropriate measures against
Since we are living in an advanced world, access, use, modification, communication,
soemtimes we are too dependent on technology manipulation, linkage, loss, derivation, and
and this can be a way in which threats or carious unauthorized destruction
lapses can occur, which can lead to doing harm,
violating non-maleficence If you collected these data, then you should
make sure that these data is secured by putting
Examples: temporary power outages, which up security measures
can sometimes stop the flow of the hospital
3
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
4
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
Any infringement of these data, you should tell They should be honest and disclose any threats
the concerned individual. You should be or no defects in their software. They should be
accountable on the data you have collected straightforward to the limitations of their product
because if they are only concerned with financial
gains in selling these products, then they are
violating the software ethics
SOFTWARE ETHICS
Health informatics ethics relies on the use of In the health institution, it is not only the
softwares to store and process information healthcare institution employees that have to follow
ethics, also those who develop machines, systems,
With that, the developers of the softwares or the and tools for these people (society, institution,
makers of the softwares of the different companies, employees)
they have an effect on the end users
5
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
other people eavesdropping, knowing that secret PUBLIC HEALTH
information If we preserve or uphold privacy and
confidentiality, then public health is also benefitted
CONFIDENTIALITY because people are not anymore afraid to seek out
Confidentiality involves more than one person professional assistance when they are having
problems.
You entrusted another person or party with
your secret infromation They are more likely to seek professional help,
especially in terms with their health
Atleast two people knows your secret information
For illness, they are more likely to go to the
For example in a hospital, you are the hospital that they trust than go to hospital
patient and you are giving personal data to that they don’t trust because it will break
this hospital. That is now confidentiality their confidentilaity
since there are two parties that are
involved (you and the hospital) More common with the COVID-19 situation.
Some people are more apprehensve to go
On the side of the hospital since they are to the hospital because maybe they will be
the second party, they should also try to judged or there will be people who will know
protect this information because this is part that they are COVID positive
of your confidentiality
That is why upholding confidentilaity is important
Confidentiality is more closely related to the because it actually also helps the general public
unintended exposure to information because your health
information is now at the hands of another party
When patients trust their healthcare
SECURITY professionals, then they will have a more holistic view
Those are the measures that we do to protect our of the patient’s overall health
privacy and to protect our confidentiality
Both the healthcare professionals and the
patient can formulate more informed
decisions
WHY DO WE NEED TO PROTECT OUR PRIVACY
AND CONFIDENTIALITY
6
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
Since they trust them, so the health care If we are protecting something tangible, then
organzations should deliver service to them those are part of the physical safeguards
the best of their capabilities
It does not only iclude your computers and your
hardwares, but also the very building or office itself
EXAMPLES
SAFEGUARDS
Office alarm systems
Part of security measures Locked offices containing computing
equipment that store electronic health
Safeguards are solutions and tools, which may be information
utilized to implement security policies at different levels Security guards
of health organization such as administrative, physical,
and technical To guard the building
ADMINISTRATIVE SAFEGUARDS
We are talking about the measures implemented TECHNICAL SAFEGUARDS
by the management as organization-wide policies If we are protecting something not tangible such
and procedures as the software, then we are now implementing
technical safeguards, which protects the software
We are talking about policies, procedures, rules, and database access and control
and protocls that the administration implements, to
be followed by the institution. They are Anything about putting security into the software
administrative safeguards (usernames, passwords, installing firewalls)
7
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
8
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
If you have an effective LIS system, then that Upon receiving the sample, the LIS will be
actually makes your job or the laboratory more updated from “collected” to “received” and
secured this is just done by scanning the barcode
Instead of having a manual way wherein the After you collect blood in your collection
patient will write in the paper for his/her personal tubes, you put your barcodes on the
records, the paper will have a chance of getting lost selection tubes
and the chance of the paper that will go into the
wrong hands RUN SAMPLE
The sample is loaded onto the analyser, and the
ORDER TESTS bar code is read. Having already received the test
Physician order tests on a patient to be draw as order from the LIS, the analyser knows which tests to
part of the laboratory’s morning blood collection perform on the patient. No work list is needed. For
rounds. The order is entered into the CIS and manually performed tests, the technologist prints a
electronically sent to the LIS work list from the LIS. The work list contains the
names of the patients and the tests ordered on each.
Upon ordering tests, the physician can just Next to each test is a space to record the result.
use the CIS and electronically send the
request to the LIS directly When we are running our tests, we will still
use the barcode.
COLLECT SAMPLE
If you are having a very highly
Before morning blood collection, the LIS prints a
comprehensive LIS that is integrated to
list of all patients who have to be drawn and the
your laboratory including your different
appropriate number of sample barcode labels for
machines, so just by attaching the barcode
each patient order. Each barcode has a patient ID,
alone to your sample, the machine will
sample contained, and laboratory workstation that
already know what test to run rather than
can be used to sort the tube once it reaches the
manually inputting the request
laboratory. Another increasingly popular approach
is for patient caregivers or nurses to collect the blood
This makes our job easier and also
sample. Immediately prior to collection, sample
improves security
barcode labels can be printed (on demand) at the
nursing station on an LIS printer or portable bedside
Lesser chance of people seeing the
printer
information since there is no more worklist
Upon collecting a sample, the LIS will just
REVIEW RESULTS
print as a copy of all request slips
The analyser produces the results and sends
Instead of writing the patient’s details, we them to the LIS. These results are only viewable to
will just use the barcodes so the patient’s technologists because they have not been released
information are now just stored for general viewing. The LIS can be programmed to
electronically. We need the barcode so that flag certaiin results – for example, critical values – so
we will just access them in the LIS rather the technologist can easily identify what needs to be
than writing everything like a patient ID, repeated or further evaluated
sample contained, and laboratory
workstation in the request slip There is a term such as flagging, in which
the machine and the LIS, if the result is too
If you are collecting blood from a patient, high or too low, will flag and will notify the
verify the name of the patient MedTech of these values (critical values –
too high/too low) and inform the physician
RECEIVE SAMPLE immediately
When the samples arrive in the laboratory, their
In hospitals, critical values is also known as
status has to be updated in the LIS from “collected”
panic values wherein if the patient have the
to “received.” This can be done by scanning each
panic values, the MedTech will call the
sample container’s barcode ID into the LIS. Once the
physician right away
sample is “received,” the LIS transmits the test order
to the analyser who will perform the test
9
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
RELEASE RESULTS Periodic review of standards in identifying
The technologist releases the results. Unflagged which results should be flagged
results are usually reviewed and released at the
Strengthen laboratory authorization and
same time. The LIS can also be programmed to
supervision policies
automatically review and relese normal results or
results that fall within a certain range. The latter Implement strict rules and regulations
approach reduces the number of tests that a regarding the testing procedures
technologist has to review. Upon release, the results
are automatically transmitted to the CIS. Release guidelines on proper disposal of
laboratory specimen
Even with the use of machine and with a Enforce policies on the proper use of
very comprehensive and effective LIS, the laboratory workstations
MedTechs has to review the results,
especially if there are flagging or abnomrla Impose disciplinary measures as needed
results
10
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
We are upholding the principle of openness General Ethics cover Autonomy, Beneficence, Non-
that we should be open to our data subjects to our Maleficence
patients on how their data will be handled
Informatics Ethics refers to Privacy, Openness,
These factors ensured that consent is freely Security, Access, Infringement, Least Intrusion and
given, specific, and informed
Accountability
Are there exceptions or cases in which it is
okay not to have consent?
11
Health Information System
WEEK NUMBER 14 / VIDEO LECTURE (MR. NIÑO PAOLO TAN) / TRANSCRIBED BY: NIÑA DE LA CRUZ
12