The idea of either allowing individuals to make their own decisions in response to a particular societal context or being free from external influence or control
Electronic Health Records (EHR)
Must respect patient autonomy
Includes certain restrictions about access, content, and ownership of records
Balance: too much patient control may defeat the purpose of the document because critical information may be modified or deleted without the knowledge of the health professional. Limited patient access and control improve document quality because patients also verify their records
Beneficence
Do good
Non-maleficence
Do no harm
Beneficence in health informatics
Relates most significantly with the usage of stored data in the EHR system
Non-maleficence in health informatics
Relates most significantly with how data is protected
Deeply integrated EHR systems are rich in raw data that can be utilized in groundbreaking biomedical and public health research
New EHR systems should be developed with consent features for researchers and scientists
Consolidated clinical data from repositories may provide the best possible treatment data for their patient, which further upholds beneficence
Integrated data storage in health informatics is also a breeding ground for varying threats like temporary outages or even total system failures resulting in the inability to performs necessary procedures or, at its worst, significant patient mortality
Multiplebackups for fast and easy recovery should remedy such problems
Medical records contain sensitive information about an individual; it deserves the highest level of data security
Vulnerabilities in security put patients at risk and lead to a violation of non-maleficence
Principles of Informatics Ethics
Information-Privacy and Disposition
Openness
Security
Access
Legitimate Infringement
Least Intrusive Alternative
Accountability
Health information ethics relies on the use of the software to store and process information
Software developers should ensure that completed activities serve the best interest of the institution and its employees
Software developers should be straightforward about their limitations and qualifications
Software developers must build products that meet the professional standards through testing and detailing unresolved issues
EHR's are widely used in developed countries
Advantages of EHR's
Improve the quality of care
Reduce cost
Enhance patient mobility
Reliable
Enable evidence-based medicine
Concerns that challenge low to middle-income countries to transition from paper-based to EHR systems
Privacy and confidentiality
Security and Data integrity
Availability
Protected Health Information (PHI)
Diagnostic report that includes the patient's name, Social Security card number, and zip code
There are 18 data elements identified by the Health Insurance Portability and Accountability Act (HIPAA) as Protected Health Information
Privacy
In healthcare settings refers to people's right to control access to their personal information. People have the authority to determine what information to share, with whom, and how
The HIPAA Privacy Rule protects the privacy of individually identifiable health information
The HIPAA Privacy Rule does not apply to the use or disclosure of "de-identified health information," which implies that the data do not contain protected health information (PHI)
Security
Refers to the protection measures and tools that safeguard health information and health information systems from any unauthorized access to or modification of information, denial of service to authorized users, and provision of service to unauthorized users
Components of Security
Data security
System security
Confidentiality
Either a tool to protect privacy or an act limiting disclosure of private matters. The intent is to ensure that individual health information is used for the intended purpose only, and that patient consent is required for any disclosure
Clear articulation of privacy, security, and confidentiality is foundational to the development and adoption of health informatics standards to prevent disclosure of PHI
The National Institute of Standards and Technology (NIST) "Confidentiality, Integrity, and Availability Triad" is a sound framework with which to analyze an organization's security management practices
Three Levels of Security in the Hospital Information System
Administrative
Physical
Technical
Administrative Safeguards for HIS
Regular risk assessment of other health IT environment
Continuous assessment of the effectiveness of safeguards for electronic health information
Detailed processes and procedures for viewing and administering electronic health information
Training for the users of health IT to appropriately protect electronic health information
Reporting of security breaches (e.g., Those entities required by law or contract) and continued health IT operations
Physical Safeguards for HIS
Office alarms systems
Locking offices and areas that contain computing equipment that stores electronic health information
Having security guards that make regular rounds in the vicinity
Technical Safeguards for HIS
Configuration of computing equipment to ensure security (e.g., Virus checking, firewall)
Using certified applications and technologies that store or exchange electronic health information
Setting up access controls to health IT and electronic health information
Encryption of electronic health information
Regular audit of the health IT operations
Having back up capabilities (e.g., Regular backups of electronic health information to another computer file serve)
5 Key Functions of Technological Security Tools
Availability
Accountability
Perimeter Identification
Controlling access
Comprehensibility and control
Key Steps in Laboratory Information Flow for a Hospital Patient
1. Register Patient
2. Order Tests
The patient record (e.g., ID Number, name, sex, age, location) must be created in the LIS before the test/s
The LIS usually receives these data automatically from the hospital registration system when a patient is admitted