SlideShare a Scribd company logo
1 of 34
Legal and Ethical
Considerations in Nursing
Informatics
Information Security and
OBJECTIVESOBJECTIVES
1. Differentiate between privacy, confidentiality,
information privacy, and information security.
2. Discuss how information system security
affects privacy, confidentiality, and security.
3. Identify potential threats to system security
and information.
OBJECTIVESOBJECTIVES
4. Discuss security measures designed to protect
information.
5. Compare and contrast available methods of
authentication in terms of levels of security,
costs, and ease of use.
6. Distinguish between appropriate and
inappropriate password selection and
processing.
OBJECTIVESOBJECTIVES
7. Identify common examples of confidential
forms and communication seen in healthcare
settings and identify proper disposal
techniques for each.
8. Discuss the impact that Internet technology
has on the security of health-related
information.
Outlines:Outlines:
1. Key concepts: privacy, confidentiality,
information privacy, and information security.
2. The effect of information system security on:
privacy, confidentiality, and security.
3. potential threats to system security and
information.
OutlinesOutlines::
4. Security measures designed to protect
information.
5. The available methods of authentication in
terms of levels of security, costs, and ease of
use.
6. Appropriate and inappropriate password
selection and processing.
OutlinesOutlines::
7. common examples of confidential forms and
communication seen in healthcare settings
and proper disposal techniques for each.
8. The impact that Internet technology has on
the security of health-related information.
Information SecurityInformation Security
 the protection of information
against threats to its integrity,
inadvertent disclosure, or
availability determines the
survivability of a system
What is Confidentiality?
 “The ethical principle or legal right that a
physician or other health professional will hold
secret all information relating to a patient,
unless the patient gives consent permitting
disclosure”(American Heritage Medical
Dictionary, 2007).
 “The nondisclosure of information except to
another authorized person” (Mosby, 2009).
Confidentiality Breach
 A breach of confidentiality is a disclosure of private
information to a third party not involved with the
patient’s care, without patient consent orcourt
order. Disclosure can be oral orwritten, by telephone
orfax, orelectronically, forexample, via e-mail or
health information networks (AMA, 2012).
 Accessing the medical records of patient’s without
legitimate reason is also considered a breach of
confidentiality (Fox, 2008).
Consent:
is an agreement, approval, or permission
given voluntarily by a competent
person that permits some act(s) for some
stated purpose(s)
For example,
a patient may consent to having their
personal health information collected
by a clinic or consent to its disclosure to a
third party (e.g., an insurance provider).
Anonymity
allows the subjects in a database
to remain nameless and
unidentified.
Pseudonymity
allows the subjects in a database to be
tracked over time while at the same time
remaining nameless. Pseudonyms (e.g.,
patient X, patient Y, etc.) are attached to
records instead of names, addresses and
other public identifiers.
Steps to SecuritySteps to Security
 Assessment of risks and assets
 An organizational plan
 A “culture” of security
 The establishment and enforcement of policies
Threats to System SecurityThreats to System Security
and Informationand Information
 Thieves
 Hackers and
crackers
 Denial of service
attacks
 Terrorists
 Viruses, worms
 Flooding sites
 Power
fluctuations
 Revenge attacks
Threats to System SecurityThreats to System Security
and Informationand Information
 Pirated Web sites
 Poor password
management
 Compromised
device
 Fires and natural
disasters
 Human error
 Unauthorized
insider access
Security MeasuresSecurity Measures
• Firewalls
– barrier created from software and hardware
• Antivirus and spyware detection
• User sign-on and passwords or other means of
identity management
• Access on a need-to-know basis- level of access
• Automatic sign-off
• Physical restrictions to system access
PasswordPassword
 Collection of alphanumeric characters that the
user types into the computer
 May be required after the entry of an access
code or user name
 Assigned after successful system training
 Inexpensive but not the most effective means
of verification
Password Selection andPassword Selection and
HandlingHandling
 Do:
 Choose passwords that
are 8-12 characters
long.
 Avoid obvious
passwords.
 Keep your password
private- ie, do not
share.
 Change password
frequently.
 Do not:
 Post or write down
passwords.
 Leave computers or
applications running
when not in use.
 Re-use the same
password for different
systems.
 Use the “browser save”
feature.
BiometricsBiometrics
 Identification based on a unique biological trait,
such as:
 a fingerprint
 voice or iris pattern
 retinal scan
 hand geometry
 face recognition
 ear pattern
 smell
 blood vessels in the palm
 gait recognition
Antivirus SoftwareAntivirus Software
 Computer programs that can locate and
eradicate viruses and other malicious programs
from scanned memory sticks, storage devices,
individual computers, and networks
Spyware Detection SoftwareSpyware Detection Software
 Spyware
 a type of software that installs itself without
the user’s permission, collects passwords,
PIN numbers, and account numbers and
sends them to another party
 Spyware Detection Software
 Detects and eliminates spyware
The Impact of the InternetThe Impact of the Internet
 Introduces new threats
 E-mail and instant messages may carry personal
health information that can be intercepted
 Unapproved use of messages or Web sites can
introduce malicious programs
 Web sites used for personal health information
may be inappropriately accessed
Implications for Mobile ComputingImplications for Mobile Computing
 Devices are easily stolen.
 Devices should require authentication and
encryption to safeguard information security.
 Devices should never be left where information
may be seen by unauthorized viewers.
 Verify wireless networks before use.
 Responsibility for information and
information system security is shared
The ten security principles
1. Accountability for information :
Organizations that collect, use or disclose
PHI are responsible for the personal health
information in their custody or care.
A named individual within the organization
should be responsible for facilitating
organizational compliance with applicable
data protection legislation and
organizational privacy policies.
2. Identifying purposes for collection , use
and disclosure of information :
To allow patients to make appropriate decisions
about their PHI, it is important that they be made
aware of the purposes for which this information
is being collected, used, and disclosed.
There are many legitimate purposes for collecting
personal health information; indeed, an
international standard classification of such
purposes has been developed
These purposes include:
• providing clinical care to an individual
• providing emergency care to an individual
• supporting care activities for the individual within the
healthcare organization.
• enabling medical billing (and/or permissions from a
funding party for providing health care services to the
patient )
• health service management and quality assurance
• education for health care professionals
• public health surveillance and disease control
3. Consent :
An organisation should be able to
demonstrate that it is in compliance with
applicable laws and that the patient can
reasonably be expected to know that
information about them was going to be
collected and used for defined purposes.
4. Limiting collection :
Organisations should limit collection of
personal health information to that which is
necessary for the identified purposes; i.e.
personal health information should not be
collected indiscriminately
Historically, many fields of data (e.g.,
religion and race) were collected in patient
records, even in cases where they had little
or no bearing on treatment and care.
5. Limiting use , disclosure and
retention :
Once organisations identify the purposes
for which they collect personal and seek
consent
6. Accuracy : The need for accuracy as a
fair information practice is particularly
relevant in the delivery of healthcare.
7. Safeguards : By implementing
information security safeguards,
organisations protect personal health
information against loss and theft, as well
as unauthorized access, disclosure,
copying, use, and modification.
8. Openness : It should be possible for
concerned patients to know the purposes
for which information about them is
collected, used, and disclosed.
9. Individual access :
Patients should have the right to access their
own personal health information so that they can
assure its accuracy, and amend inaccurate or
incomplete information
10. Challenging compliance :
The right of a patient to lodge a privacy
complaint against an organization was fi rst
articulated when the Fair Information Practices
were promulgated more than 40 years ago
Reference
Hebda, T. & Czar, P. (2013). Handbook of
informatics for nurses and health care
professionals (5th
 ed.). Upper Saddle River,
New Jersey: Pearson. 

More Related Content

What's hot

Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityJaimika Patel
 
Legal issues in nursing
Legal issues in nursingLegal issues in nursing
Legal issues in nursingRuppaMercy
 
Health informatics
Health informaticsHealth informatics
Health informaticsPinki Barman
 
Health informatic
Health informaticHealth informatic
Health informaticCenPalmei
 
Nursing technology informatics presentation
Nursing technology informatics presentationNursing technology informatics presentation
Nursing technology informatics presentationLeeann Sills
 
steps of nursing process, Planning
steps of nursing process, Planningsteps of nursing process, Planning
steps of nursing process, PlanningArifa T N
 
Theories, models, & frameworks
Theories, models, & frameworksTheories, models, & frameworks
Theories, models, & frameworksMinette Din
 
Nursing theories
Nursing theoriesNursing theories
Nursing theoriesMae Aguilar
 
Ethical and legal issues in Health informatics.pptx
Ethical and legal issues in Health informatics.pptxEthical and legal issues in Health informatics.pptx
Ethical and legal issues in Health informatics.pptxSarojKamboj
 
nursing documentation
nursing documentationnursing documentation
nursing documentationcjnoyd
 

What's hot (20)

Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and security
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
Legal issues in nursing
Legal issues in nursingLegal issues in nursing
Legal issues in nursing
 
Health informatics
Health informaticsHealth informatics
Health informatics
 
Health informatic
Health informaticHealth informatic
Health informatic
 
Nursing technology informatics presentation
Nursing technology informatics presentationNursing technology informatics presentation
Nursing technology informatics presentation
 
steps of nursing process, Planning
steps of nursing process, Planningsteps of nursing process, Planning
steps of nursing process, Planning
 
Nursing theories-ppt
Nursing theories-pptNursing theories-ppt
Nursing theories-ppt
 
Computer in nursing
Computer in nursingComputer in nursing
Computer in nursing
 
Health informatics
Health informaticsHealth informatics
Health informatics
 
Health informatics
Health  informatics Health  informatics
Health informatics
 
Theories, models, & frameworks
Theories, models, & frameworksTheories, models, & frameworks
Theories, models, & frameworks
 
Nursing theories
Nursing theoriesNursing theories
Nursing theories
 
Ethics in nursing
Ethics in nursingEthics in nursing
Ethics in nursing
 
Ethical and legal issues in Health informatics.pptx
Ethical and legal issues in Health informatics.pptxEthical and legal issues in Health informatics.pptx
Ethical and legal issues in Health informatics.pptx
 
nursing documentation
nursing documentationnursing documentation
nursing documentation
 
Informatics & Technology in Nursing
Informatics & Technology in NursingInformatics & Technology in Nursing
Informatics & Technology in Nursing
 
Nursing process planning
Nursing process planningNursing process planning
Nursing process planning
 
Legal & ethical issues in nursing
Legal & ethical issues in nursingLegal & ethical issues in nursing
Legal & ethical issues in nursing
 
Nursing Ethics
Nursing EthicsNursing Ethics
Nursing Ethics
 

Similar to Legal and ethical considerations in nursing informatics

Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareLajpat Rai
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act Kartheek Kein
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextNawanan Theera-Ampornpunt
 
Ann Cavoukian Presentation
Ann Cavoukian PresentationAnn Cavoukian Presentation
Ann Cavoukian PresentationCityAge
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docxsheronlewthwaite
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1SNikki
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsMEASURE Evaluation
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityLucy Lacy
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityLucy Lacy
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalLucy Lacy
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docxteresehearn
 
Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareVaileth Mdete
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Securing health information
Securing health informationSecuring health information
Securing health informationDarla Moore
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 

Similar to Legal and ethical considerations in nursing informatics (20)

Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health Care
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act 
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's Context
 
Ann Cavoukian Presentation
Ann Cavoukian PresentationAnn Cavoukian Presentation
Ann Cavoukian Presentation
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
 
Data security training
Data security trainingData security training
Data security training
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality final
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health Care
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Securing health information
Securing health informationSecuring health information
Securing health information
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
HIPAA
HIPAAHIPAA
HIPAA
 

More from AHMED ZINHOM

Technological changes and cost
Technological changes and costTechnological changes and cost
Technological changes and costAHMED ZINHOM
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systemsAHMED ZINHOM
 
Cost effectiveness and cost efficiency
Cost effectiveness and cost efficiencyCost effectiveness and cost efficiency
Cost effectiveness and cost efficiencyAHMED ZINHOM
 
Absenteeism and turn over
Absenteeism and turn overAbsenteeism and turn over
Absenteeism and turn overAHMED ZINHOM
 
patient classification system,staffing
patient classification system,staffingpatient classification system,staffing
patient classification system,staffingAHMED ZINHOM
 
Group decision making
Group decision makingGroup decision making
Group decision makingAHMED ZINHOM
 
Types of staff development
Types of staff developmentTypes of staff development
Types of staff developmentAHMED ZINHOM
 
Recruitment&selection of nursing personnel
Recruitment&selection of nursing personnelRecruitment&selection of nursing personnel
Recruitment&selection of nursing personnelAHMED ZINHOM
 

More from AHMED ZINHOM (11)

Technological changes and cost
Technological changes and costTechnological changes and cost
Technological changes and cost
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systems
 
Cost effectiveness and cost efficiency
Cost effectiveness and cost efficiencyCost effectiveness and cost efficiency
Cost effectiveness and cost efficiency
 
Absenteeism and turn over
Absenteeism and turn overAbsenteeism and turn over
Absenteeism and turn over
 
Time management
Time managementTime management
Time management
 
Shared governance
Shared governanceShared governance
Shared governance
 
patient classification system,staffing
patient classification system,staffingpatient classification system,staffing
patient classification system,staffing
 
Group decision making
Group decision makingGroup decision making
Group decision making
 
Types of staff development
Types of staff developmentTypes of staff development
Types of staff development
 
Recruitment&selection of nursing personnel
Recruitment&selection of nursing personnelRecruitment&selection of nursing personnel
Recruitment&selection of nursing personnel
 
Accreditation
AccreditationAccreditation
Accreditation
 

Recently uploaded

Thoothukudi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thoothukudi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetThoothukudi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thoothukudi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsEscorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsAhmedabad Call Girls
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapurgragmanisha42
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...Ahmedabad Call Girls
 
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in LahoreBest Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in LahoreDeny Daniel
 
Krishnagiri call girls Tamil Actress sex service 7877702510
Krishnagiri call girls Tamil Actress sex service 7877702510Krishnagiri call girls Tamil Actress sex service 7877702510
Krishnagiri call girls Tamil Actress sex service 7877702510Vipesco
 
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun  UttrakhandDehradun Call Girls 8854095900 Call Girl in Dehradun  Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhandindiancallgirl4rent
 
jabalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
jabalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetjabalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
jabalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real MeetVip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real MeetAhmedabad Call Girls
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...chandigarhentertainm
 
Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Sheetaleventcompany
 
Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Vipesco
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...Sheetaleventcompany
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 

Recently uploaded (20)

Thoothukudi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thoothukudi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetThoothukudi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thoothukudi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsEscorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
 
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dhanbad Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in LahoreBest Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
Best Lahore Escorts 😮‍💨03250114445 || VIP escorts in Lahore
 
Krishnagiri call girls Tamil Actress sex service 7877702510
Krishnagiri call girls Tamil Actress sex service 7877702510Krishnagiri call girls Tamil Actress sex service 7877702510
Krishnagiri call girls Tamil Actress sex service 7877702510
 
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun  UttrakhandDehradun Call Girls 8854095900 Call Girl in Dehradun  Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
 
jabalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
jabalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetjabalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
jabalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real MeetVip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
 
Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024Top 20 Famous Indian Female Pornstars Name List 2024
Top 20 Famous Indian Female Pornstars Name List 2024
 
Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510Kochi call girls Mallu escort girls available 7877702510
Kochi call girls Mallu escort girls available 7877702510
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangalor...
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 

Legal and ethical considerations in nursing informatics

  • 1. Legal and Ethical Considerations in Nursing Informatics Information Security and
  • 2. OBJECTIVESOBJECTIVES 1. Differentiate between privacy, confidentiality, information privacy, and information security. 2. Discuss how information system security affects privacy, confidentiality, and security. 3. Identify potential threats to system security and information.
  • 3. OBJECTIVESOBJECTIVES 4. Discuss security measures designed to protect information. 5. Compare and contrast available methods of authentication in terms of levels of security, costs, and ease of use. 6. Distinguish between appropriate and inappropriate password selection and processing.
  • 4. OBJECTIVESOBJECTIVES 7. Identify common examples of confidential forms and communication seen in healthcare settings and identify proper disposal techniques for each. 8. Discuss the impact that Internet technology has on the security of health-related information.
  • 5. Outlines:Outlines: 1. Key concepts: privacy, confidentiality, information privacy, and information security. 2. The effect of information system security on: privacy, confidentiality, and security. 3. potential threats to system security and information.
  • 6. OutlinesOutlines:: 4. Security measures designed to protect information. 5. The available methods of authentication in terms of levels of security, costs, and ease of use. 6. Appropriate and inappropriate password selection and processing.
  • 7. OutlinesOutlines:: 7. common examples of confidential forms and communication seen in healthcare settings and proper disposal techniques for each. 8. The impact that Internet technology has on the security of health-related information.
  • 8. Information SecurityInformation Security  the protection of information against threats to its integrity, inadvertent disclosure, or availability determines the survivability of a system
  • 9. What is Confidentiality?  “The ethical principle or legal right that a physician or other health professional will hold secret all information relating to a patient, unless the patient gives consent permitting disclosure”(American Heritage Medical Dictionary, 2007).  “The nondisclosure of information except to another authorized person” (Mosby, 2009).
  • 10. Confidentiality Breach  A breach of confidentiality is a disclosure of private information to a third party not involved with the patient’s care, without patient consent orcourt order. Disclosure can be oral orwritten, by telephone orfax, orelectronically, forexample, via e-mail or health information networks (AMA, 2012).  Accessing the medical records of patient’s without legitimate reason is also considered a breach of confidentiality (Fox, 2008).
  • 11. Consent: is an agreement, approval, or permission given voluntarily by a competent person that permits some act(s) for some stated purpose(s) For example, a patient may consent to having their personal health information collected by a clinic or consent to its disclosure to a third party (e.g., an insurance provider).
  • 12. Anonymity allows the subjects in a database to remain nameless and unidentified.
  • 13. Pseudonymity allows the subjects in a database to be tracked over time while at the same time remaining nameless. Pseudonyms (e.g., patient X, patient Y, etc.) are attached to records instead of names, addresses and other public identifiers.
  • 14. Steps to SecuritySteps to Security  Assessment of risks and assets  An organizational plan  A “culture” of security  The establishment and enforcement of policies
  • 15. Threats to System SecurityThreats to System Security and Informationand Information  Thieves  Hackers and crackers  Denial of service attacks  Terrorists  Viruses, worms  Flooding sites  Power fluctuations  Revenge attacks
  • 16. Threats to System SecurityThreats to System Security and Informationand Information  Pirated Web sites  Poor password management  Compromised device  Fires and natural disasters  Human error  Unauthorized insider access
  • 17. Security MeasuresSecurity Measures • Firewalls – barrier created from software and hardware • Antivirus and spyware detection • User sign-on and passwords or other means of identity management • Access on a need-to-know basis- level of access • Automatic sign-off • Physical restrictions to system access
  • 18. PasswordPassword  Collection of alphanumeric characters that the user types into the computer  May be required after the entry of an access code or user name  Assigned after successful system training  Inexpensive but not the most effective means of verification
  • 19. Password Selection andPassword Selection and HandlingHandling  Do:  Choose passwords that are 8-12 characters long.  Avoid obvious passwords.  Keep your password private- ie, do not share.  Change password frequently.  Do not:  Post or write down passwords.  Leave computers or applications running when not in use.  Re-use the same password for different systems.  Use the “browser save” feature.
  • 20. BiometricsBiometrics  Identification based on a unique biological trait, such as:  a fingerprint  voice or iris pattern  retinal scan  hand geometry  face recognition  ear pattern  smell  blood vessels in the palm  gait recognition
  • 21. Antivirus SoftwareAntivirus Software  Computer programs that can locate and eradicate viruses and other malicious programs from scanned memory sticks, storage devices, individual computers, and networks
  • 22. Spyware Detection SoftwareSpyware Detection Software  Spyware  a type of software that installs itself without the user’s permission, collects passwords, PIN numbers, and account numbers and sends them to another party  Spyware Detection Software  Detects and eliminates spyware
  • 23. The Impact of the InternetThe Impact of the Internet  Introduces new threats  E-mail and instant messages may carry personal health information that can be intercepted  Unapproved use of messages or Web sites can introduce malicious programs  Web sites used for personal health information may be inappropriately accessed
  • 24. Implications for Mobile ComputingImplications for Mobile Computing  Devices are easily stolen.  Devices should require authentication and encryption to safeguard information security.  Devices should never be left where information may be seen by unauthorized viewers.
  • 25.  Verify wireless networks before use.  Responsibility for information and information system security is shared
  • 26. The ten security principles 1. Accountability for information : Organizations that collect, use or disclose PHI are responsible for the personal health information in their custody or care. A named individual within the organization should be responsible for facilitating organizational compliance with applicable data protection legislation and organizational privacy policies.
  • 27. 2. Identifying purposes for collection , use and disclosure of information : To allow patients to make appropriate decisions about their PHI, it is important that they be made aware of the purposes for which this information is being collected, used, and disclosed. There are many legitimate purposes for collecting personal health information; indeed, an international standard classification of such purposes has been developed
  • 28. These purposes include: • providing clinical care to an individual • providing emergency care to an individual • supporting care activities for the individual within the healthcare organization. • enabling medical billing (and/or permissions from a funding party for providing health care services to the patient ) • health service management and quality assurance • education for health care professionals • public health surveillance and disease control
  • 29. 3. Consent : An organisation should be able to demonstrate that it is in compliance with applicable laws and that the patient can reasonably be expected to know that information about them was going to be collected and used for defined purposes.
  • 30. 4. Limiting collection : Organisations should limit collection of personal health information to that which is necessary for the identified purposes; i.e. personal health information should not be collected indiscriminately Historically, many fields of data (e.g., religion and race) were collected in patient records, even in cases where they had little or no bearing on treatment and care.
  • 31. 5. Limiting use , disclosure and retention : Once organisations identify the purposes for which they collect personal and seek consent 6. Accuracy : The need for accuracy as a fair information practice is particularly relevant in the delivery of healthcare.
  • 32. 7. Safeguards : By implementing information security safeguards, organisations protect personal health information against loss and theft, as well as unauthorized access, disclosure, copying, use, and modification. 8. Openness : It should be possible for concerned patients to know the purposes for which information about them is collected, used, and disclosed.
  • 33. 9. Individual access : Patients should have the right to access their own personal health information so that they can assure its accuracy, and amend inaccurate or incomplete information 10. Challenging compliance : The right of a patient to lodge a privacy complaint against an organization was fi rst articulated when the Fair Information Practices were promulgated more than 40 years ago
  • 34. Reference Hebda, T. & Czar, P. (2013). Handbook of informatics for nurses and health care professionals (5th  ed.). Upper Saddle River, New Jersey: Pearson. 

Editor's Notes

  1. inadvertent غير مقصود
  2. Revenge الانتقام
  3. Pirated المقرصنة
  4. Iris قزحية العين
  5. instant الفورية