SlideShare a Scribd company logo
1 of 34
Legal and Ethical
Considerations in Nursing
Informatics
Information Security and
OBJECTIVESOBJECTIVES
1. Differentiate between privacy, confidentiality,
information privacy, and information security.
2. Discuss how information system security
affects privacy, confidentiality, and security.
3. Identify potential threats to system security
and information.
OBJECTIVESOBJECTIVES
4. Discuss security measures designed to protect
information.
5. Compare and contrast available methods of
authentication in terms of levels of security,
costs, and ease of use.
6. Distinguish between appropriate and
inappropriate password selection and
processing.
OBJECTIVESOBJECTIVES
7. Identify common examples of confidential
forms and communication seen in healthcare
settings and identify proper disposal
techniques for each.
8. Discuss the impact that Internet technology
has on the security of health-related
information.
Outlines:Outlines:
1. Key concepts: privacy, confidentiality,
information privacy, and information security.
2. The effect of information system security on:
privacy, confidentiality, and security.
3. potential threats to system security and
information.
OutlinesOutlines::
4. Security measures designed to protect
information.
5. The available methods of authentication in
terms of levels of security, costs, and ease of
use.
6. Appropriate and inappropriate password
selection and processing.
OutlinesOutlines::
7. common examples of confidential forms and
communication seen in healthcare settings
and proper disposal techniques for each.
8. The impact that Internet technology has on
the security of health-related information.
Information SecurityInformation Security
 the protection of information
against threats to its integrity,
inadvertent disclosure, or
availability determines the
survivability of a system
What is Confidentiality?
 “The ethical principle or legal right that a
physician or other health professional will hold
secret all information relating to a patient,
unless the patient gives consent permitting
disclosure”(American Heritage Medical
Dictionary, 2007).
 “The nondisclosure of information except to
another authorized person” (Mosby, 2009).
Confidentiality Breach
 A breach of confidentiality is a disclosure of private
information to a third party not involved with the
patient’s care, without patient consent orcourt
order. Disclosure can be oral orwritten, by telephone
orfax, orelectronically, forexample, via e-mail or
health information networks (AMA, 2012).
 Accessing the medical records of patient’s without
legitimate reason is also considered a breach of
confidentiality (Fox, 2008).
Consent:
is an agreement, approval, or permission
given voluntarily by a competent
person that permits some act(s) for some
stated purpose(s)
For example,
a patient may consent to having their
personal health information collected
by a clinic or consent to its disclosure to a
third party (e.g., an insurance provider).
Anonymity
allows the subjects in a database
to remain nameless and
unidentified.
Pseudonymity
allows the subjects in a database to be
tracked over time while at the same time
remaining nameless. Pseudonyms (e.g.,
patient X, patient Y, etc.) are attached to
records instead of names, addresses and
other public identifiers.
Steps to SecuritySteps to Security
 Assessment of risks and assets
 An organizational plan
 A “culture” of security
 The establishment and enforcement of policies
Threats to System SecurityThreats to System Security
and Informationand Information
 Thieves
 Hackers and
crackers
 Denial of service
attacks
 Terrorists
 Viruses, worms
 Flooding sites
 Power
fluctuations
 Revenge attacks
Threats to System SecurityThreats to System Security
and Informationand Information
 Pirated Web sites
 Poor password
management
 Compromised
device
 Fires and natural
disasters
 Human error
 Unauthorized
insider access
Security MeasuresSecurity Measures
• Firewalls
– barrier created from software and hardware
• Antivirus and spyware detection
• User sign-on and passwords or other means of
identity management
• Access on a need-to-know basis- level of access
• Automatic sign-off
• Physical restrictions to system access
PasswordPassword
 Collection of alphanumeric characters that the
user types into the computer
 May be required after the entry of an access
code or user name
 Assigned after successful system training
 Inexpensive but not the most effective means
of verification
Password Selection andPassword Selection and
HandlingHandling
 Do:
 Choose passwords that
are 8-12 characters
long.
 Avoid obvious
passwords.
 Keep your password
private- ie, do not
share.
 Change password
frequently.
 Do not:
 Post or write down
passwords.
 Leave computers or
applications running
when not in use.
 Re-use the same
password for different
systems.
 Use the “browser save”
feature.
BiometricsBiometrics
 Identification based on a unique biological trait,
such as:
 a fingerprint
 voice or iris pattern
 retinal scan
 hand geometry
 face recognition
 ear pattern
 smell
 blood vessels in the palm
 gait recognition
Antivirus SoftwareAntivirus Software
 Computer programs that can locate and
eradicate viruses and other malicious programs
from scanned memory sticks, storage devices,
individual computers, and networks
Spyware Detection SoftwareSpyware Detection Software
 Spyware
 a type of software that installs itself without
the user’s permission, collects passwords,
PIN numbers, and account numbers and
sends them to another party
 Spyware Detection Software
 Detects and eliminates spyware
The Impact of the InternetThe Impact of the Internet
 Introduces new threats
 E-mail and instant messages may carry personal
health information that can be intercepted
 Unapproved use of messages or Web sites can
introduce malicious programs
 Web sites used for personal health information
may be inappropriately accessed
Implications for Mobile ComputingImplications for Mobile Computing
 Devices are easily stolen.
 Devices should require authentication and
encryption to safeguard information security.
 Devices should never be left where information
may be seen by unauthorized viewers.
 Verify wireless networks before use.
 Responsibility for information and
information system security is shared
The ten security principles
1. Accountability for information :
Organizations that collect, use or disclose
PHI are responsible for the personal health
information in their custody or care.
A named individual within the organization
should be responsible for facilitating
organizational compliance with applicable
data protection legislation and
organizational privacy policies.
2. Identifying purposes for collection , use
and disclosure of information :
To allow patients to make appropriate decisions
about their PHI, it is important that they be made
aware of the purposes for which this information
is being collected, used, and disclosed.
There are many legitimate purposes for collecting
personal health information; indeed, an
international standard classification of such
purposes has been developed
These purposes include:
• providing clinical care to an individual
• providing emergency care to an individual
• supporting care activities for the individual within the
healthcare organization.
• enabling medical billing (and/or permissions from a
funding party for providing health care services to the
patient )
• health service management and quality assurance
• education for health care professionals
• public health surveillance and disease control
3. Consent :
An organisation should be able to
demonstrate that it is in compliance with
applicable laws and that the patient can
reasonably be expected to know that
information about them was going to be
collected and used for defined purposes.
4. Limiting collection :
Organisations should limit collection of
personal health information to that which is
necessary for the identified purposes; i.e.
personal health information should not be
collected indiscriminately
Historically, many fields of data (e.g.,
religion and race) were collected in patient
records, even in cases where they had little
or no bearing on treatment and care.
5. Limiting use , disclosure and
retention :
Once organisations identify the purposes
for which they collect personal and seek
consent
6. Accuracy : The need for accuracy as a
fair information practice is particularly
relevant in the delivery of healthcare.
7. Safeguards : By implementing
information security safeguards,
organisations protect personal health
information against loss and theft, as well
as unauthorized access, disclosure,
copying, use, and modification.
8. Openness : It should be possible for
concerned patients to know the purposes
for which information about them is
collected, used, and disclosed.
9. Individual access :
Patients should have the right to access their
own personal health information so that they can
assure its accuracy, and amend inaccurate or
incomplete information
10. Challenging compliance :
The right of a patient to lodge a privacy
complaint against an organization was fi rst
articulated when the Fair Information Practices
were promulgated more than 40 years ago
Reference
Hebda, T. & Czar, P. (2013). Handbook of
informatics for nurses and health care
professionals (5th
 ed.). Upper Saddle River,
New Jersey: Pearson. 

More Related Content

What's hot

Nursing informatics presentation
Nursing informatics presentationNursing informatics presentation
Nursing informatics presentationLeeann Sills
 
nursing informatic Competency
 nursing informatic Competency nursing informatic Competency
nursing informatic CompetencySaly Hassan
 
Legal issues in nursing practice
Legal  issues in nursing practiceLegal  issues in nursing practice
Legal issues in nursing practiceNursing Hi Nursing
 
DOCUMENTATION IN NURSING
DOCUMENTATION IN NURSINGDOCUMENTATION IN NURSING
DOCUMENTATION IN NURSINGANILKUMAR BR
 
Nursing Assessment
Nursing AssessmentNursing Assessment
Nursing Assessmentpreet kaur
 
Legal Aspects in Nursing (NURSING ADMINISTRATION)
Legal Aspects in Nursing (NURSING ADMINISTRATION)Legal Aspects in Nursing (NURSING ADMINISTRATION)
Legal Aspects in Nursing (NURSING ADMINISTRATION)home
 
Ethical and legal issues in Health informatics.pptx
Ethical and legal issues in Health informatics.pptxEthical and legal issues in Health informatics.pptx
Ethical and legal issues in Health informatics.pptxSarojKamboj
 
nursing documentation
nursing documentationnursing documentation
nursing documentationcjnoyd
 
Nursing Health Assessment
Nursing Health Assessment Nursing Health Assessment
Nursing Health Assessment Shanta Peter
 
Legal issues in nursing ppt
Legal issues in nursing pptLegal issues in nursing ppt
Legal issues in nursing pptLinda Sapam
 

What's hot (20)

Nursing informatics presentation
Nursing informatics presentationNursing informatics presentation
Nursing informatics presentation
 
Nsg informatics
Nsg informaticsNsg informatics
Nsg informatics
 
nursing informatic Competency
 nursing informatic Competency nursing informatic Competency
nursing informatic Competency
 
Legal issues in nursing practice
Legal  issues in nursing practiceLegal  issues in nursing practice
Legal issues in nursing practice
 
DOCUMENTATION IN NURSING
DOCUMENTATION IN NURSINGDOCUMENTATION IN NURSING
DOCUMENTATION IN NURSING
 
Health informatics
Health  informatics Health  informatics
Health informatics
 
Nursing informatics
Nursing informaticsNursing informatics
Nursing informatics
 
Nursing Assessment
Nursing AssessmentNursing Assessment
Nursing Assessment
 
Legal Aspects in Nursing (NURSING ADMINISTRATION)
Legal Aspects in Nursing (NURSING ADMINISTRATION)Legal Aspects in Nursing (NURSING ADMINISTRATION)
Legal Aspects in Nursing (NURSING ADMINISTRATION)
 
Health informatics
Health informaticsHealth informatics
Health informatics
 
Ethical and legal issues in Health informatics.pptx
Ethical and legal issues in Health informatics.pptxEthical and legal issues in Health informatics.pptx
Ethical and legal issues in Health informatics.pptx
 
Nursing Ethics
Nursing EthicsNursing Ethics
Nursing Ethics
 
nursing assessment
nursing assessmentnursing assessment
nursing assessment
 
nursing documentation
nursing documentationnursing documentation
nursing documentation
 
Informatics & Technology in Nursing
Informatics & Technology in NursingInformatics & Technology in Nursing
Informatics & Technology in Nursing
 
Legal & ethical issues in nursing- issues in india
Legal & ethical issues in nursing-  issues in indiaLegal & ethical issues in nursing-  issues in india
Legal & ethical issues in nursing- issues in india
 
Legal & ethical issues in nursing
Legal & ethical issues in nursingLegal & ethical issues in nursing
Legal & ethical issues in nursing
 
Ncp hyperthermia
Ncp hyperthermiaNcp hyperthermia
Ncp hyperthermia
 
Nursing Health Assessment
Nursing Health Assessment Nursing Health Assessment
Nursing Health Assessment
 
Legal issues in nursing ppt
Legal issues in nursing pptLegal issues in nursing ppt
Legal issues in nursing ppt
 

Similar to Legal and Ethical Considerations in Nursing Informatics: Information Security

Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareLajpat Rai
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act Kartheek Kein
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextNawanan Theera-Ampornpunt
 
Ann Cavoukian Presentation
Ann Cavoukian PresentationAnn Cavoukian Presentation
Ann Cavoukian PresentationCityAge
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docxsheronlewthwaite
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1SNikki
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsMEASURE Evaluation
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityLucy Lacy
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityLucy Lacy
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalLucy Lacy
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docxteresehearn
 
Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareVaileth Mdete
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Securing health information
Securing health informationSecuring health information
Securing health informationDarla Moore
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 

Similar to Legal and Ethical Considerations in Nursing Informatics: Information Security (20)

Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health Care
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act 
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's Context
 
Ann Cavoukian Presentation
Ann Cavoukian PresentationAnn Cavoukian Presentation
Ann Cavoukian Presentation
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
 
Data security training
Data security trainingData security training
Data security training
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality final
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health Care
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Securing health information
Securing health informationSecuring health information
Securing health information
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
HIPAA
HIPAAHIPAA
HIPAA
 

More from AHMED ZINHOM

Technological changes and cost
Technological changes and costTechnological changes and cost
Technological changes and costAHMED ZINHOM
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systemsAHMED ZINHOM
 
Cost effectiveness and cost efficiency
Cost effectiveness and cost efficiencyCost effectiveness and cost efficiency
Cost effectiveness and cost efficiencyAHMED ZINHOM
 
Absenteeism and turn over
Absenteeism and turn overAbsenteeism and turn over
Absenteeism and turn overAHMED ZINHOM
 
patient classification system,staffing
patient classification system,staffingpatient classification system,staffing
patient classification system,staffingAHMED ZINHOM
 
Group decision making
Group decision makingGroup decision making
Group decision makingAHMED ZINHOM
 
Types of staff development
Types of staff developmentTypes of staff development
Types of staff developmentAHMED ZINHOM
 
Recruitment&selection of nursing personnel
Recruitment&selection of nursing personnelRecruitment&selection of nursing personnel
Recruitment&selection of nursing personnelAHMED ZINHOM
 

More from AHMED ZINHOM (11)

Technological changes and cost
Technological changes and costTechnological changes and cost
Technological changes and cost
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systems
 
Cost effectiveness and cost efficiency
Cost effectiveness and cost efficiencyCost effectiveness and cost efficiency
Cost effectiveness and cost efficiency
 
Absenteeism and turn over
Absenteeism and turn overAbsenteeism and turn over
Absenteeism and turn over
 
Time management
Time managementTime management
Time management
 
Shared governance
Shared governanceShared governance
Shared governance
 
patient classification system,staffing
patient classification system,staffingpatient classification system,staffing
patient classification system,staffing
 
Group decision making
Group decision makingGroup decision making
Group decision making
 
Types of staff development
Types of staff developmentTypes of staff development
Types of staff development
 
Recruitment&selection of nursing personnel
Recruitment&selection of nursing personnelRecruitment&selection of nursing personnel
Recruitment&selection of nursing personnel
 
Accreditation
AccreditationAccreditation
Accreditation
 

Recently uploaded

Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...scanFOAM
 
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...narwatsonia7
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts ServiceCall Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Servicenarwatsonia7
 
Pregnancy and Breastfeeding Dental Considerations.pptx
Pregnancy and Breastfeeding Dental Considerations.pptxPregnancy and Breastfeeding Dental Considerations.pptx
Pregnancy and Breastfeeding Dental Considerations.pptxcrosalofton
 
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...narwatsonia7
 
Call Girls Hsr Layout Whatsapp 7001305949 Independent Escort Service
Call Girls Hsr Layout Whatsapp 7001305949 Independent Escort ServiceCall Girls Hsr Layout Whatsapp 7001305949 Independent Escort Service
Call Girls Hsr Layout Whatsapp 7001305949 Independent Escort Servicenarwatsonia7
 
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed RuleShelby Lewis
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology InsightsHealth Catalyst
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...narwatsonia7
 
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...narwatsonia7
 
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original Photos
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original PhotosCall Girls Laxmi Nagar 9999965857 Cheap and Best with original Photos
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original Photosparshadkalavatidevi7
 
Call Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaon
Call Girls Gurgaon Vani 9999965857 Independent Escort Service GurgaonCall Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaon
Call Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaonnitachopra
 
Call Girls Dwarka 9999965857 Cheap & Best with original Photos
Call Girls Dwarka 9999965857 Cheap & Best with original PhotosCall Girls Dwarka 9999965857 Cheap & Best with original Photos
Call Girls Dwarka 9999965857 Cheap & Best with original Photosparshadkalavatidevi7
 
Gurgaon Sector 45 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 45 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 45 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 45 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...vrvipin164
 
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
Call Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any TimeCall Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any Timedelhimodelshub1
 
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdf
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdfSARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdf
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdfDolisha Warbi
 

Recently uploaded (20)

Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
 
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
 
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts ServiceCall Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
 
Pregnancy and Breastfeeding Dental Considerations.pptx
Pregnancy and Breastfeeding Dental Considerations.pptxPregnancy and Breastfeeding Dental Considerations.pptx
Pregnancy and Breastfeeding Dental Considerations.pptx
 
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...
 
Call Girls Hsr Layout Whatsapp 7001305949 Independent Escort Service
Call Girls Hsr Layout Whatsapp 7001305949 Independent Escort ServiceCall Girls Hsr Layout Whatsapp 7001305949 Independent Escort Service
Call Girls Hsr Layout Whatsapp 7001305949 Independent Escort Service
 
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
 
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...
 
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...
 
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original Photos
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original PhotosCall Girls Laxmi Nagar 9999965857 Cheap and Best with original Photos
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original Photos
 
Call Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaon
Call Girls Gurgaon Vani 9999965857 Independent Escort Service GurgaonCall Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaon
Call Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaon
 
Call Girls Dwarka 9999965857 Cheap & Best with original Photos
Call Girls Dwarka 9999965857 Cheap & Best with original PhotosCall Girls Dwarka 9999965857 Cheap & Best with original Photos
Call Girls Dwarka 9999965857 Cheap & Best with original Photos
 
Gurgaon Sector 45 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 45 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 45 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 45 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
 
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
 
Call Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any TimeCall Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any Time
 
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdf
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdfSARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdf
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdf
 
Russian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your bookingRussian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your booking
 

Legal and Ethical Considerations in Nursing Informatics: Information Security

  • 1. Legal and Ethical Considerations in Nursing Informatics Information Security and
  • 2. OBJECTIVESOBJECTIVES 1. Differentiate between privacy, confidentiality, information privacy, and information security. 2. Discuss how information system security affects privacy, confidentiality, and security. 3. Identify potential threats to system security and information.
  • 3. OBJECTIVESOBJECTIVES 4. Discuss security measures designed to protect information. 5. Compare and contrast available methods of authentication in terms of levels of security, costs, and ease of use. 6. Distinguish between appropriate and inappropriate password selection and processing.
  • 4. OBJECTIVESOBJECTIVES 7. Identify common examples of confidential forms and communication seen in healthcare settings and identify proper disposal techniques for each. 8. Discuss the impact that Internet technology has on the security of health-related information.
  • 5. Outlines:Outlines: 1. Key concepts: privacy, confidentiality, information privacy, and information security. 2. The effect of information system security on: privacy, confidentiality, and security. 3. potential threats to system security and information.
  • 6. OutlinesOutlines:: 4. Security measures designed to protect information. 5. The available methods of authentication in terms of levels of security, costs, and ease of use. 6. Appropriate and inappropriate password selection and processing.
  • 7. OutlinesOutlines:: 7. common examples of confidential forms and communication seen in healthcare settings and proper disposal techniques for each. 8. The impact that Internet technology has on the security of health-related information.
  • 8. Information SecurityInformation Security  the protection of information against threats to its integrity, inadvertent disclosure, or availability determines the survivability of a system
  • 9. What is Confidentiality?  “The ethical principle or legal right that a physician or other health professional will hold secret all information relating to a patient, unless the patient gives consent permitting disclosure”(American Heritage Medical Dictionary, 2007).  “The nondisclosure of information except to another authorized person” (Mosby, 2009).
  • 10. Confidentiality Breach  A breach of confidentiality is a disclosure of private information to a third party not involved with the patient’s care, without patient consent orcourt order. Disclosure can be oral orwritten, by telephone orfax, orelectronically, forexample, via e-mail or health information networks (AMA, 2012).  Accessing the medical records of patient’s without legitimate reason is also considered a breach of confidentiality (Fox, 2008).
  • 11. Consent: is an agreement, approval, or permission given voluntarily by a competent person that permits some act(s) for some stated purpose(s) For example, a patient may consent to having their personal health information collected by a clinic or consent to its disclosure to a third party (e.g., an insurance provider).
  • 12. Anonymity allows the subjects in a database to remain nameless and unidentified.
  • 13. Pseudonymity allows the subjects in a database to be tracked over time while at the same time remaining nameless. Pseudonyms (e.g., patient X, patient Y, etc.) are attached to records instead of names, addresses and other public identifiers.
  • 14. Steps to SecuritySteps to Security  Assessment of risks and assets  An organizational plan  A “culture” of security  The establishment and enforcement of policies
  • 15. Threats to System SecurityThreats to System Security and Informationand Information  Thieves  Hackers and crackers  Denial of service attacks  Terrorists  Viruses, worms  Flooding sites  Power fluctuations  Revenge attacks
  • 16. Threats to System SecurityThreats to System Security and Informationand Information  Pirated Web sites  Poor password management  Compromised device  Fires and natural disasters  Human error  Unauthorized insider access
  • 17. Security MeasuresSecurity Measures • Firewalls – barrier created from software and hardware • Antivirus and spyware detection • User sign-on and passwords or other means of identity management • Access on a need-to-know basis- level of access • Automatic sign-off • Physical restrictions to system access
  • 18. PasswordPassword  Collection of alphanumeric characters that the user types into the computer  May be required after the entry of an access code or user name  Assigned after successful system training  Inexpensive but not the most effective means of verification
  • 19. Password Selection andPassword Selection and HandlingHandling  Do:  Choose passwords that are 8-12 characters long.  Avoid obvious passwords.  Keep your password private- ie, do not share.  Change password frequently.  Do not:  Post or write down passwords.  Leave computers or applications running when not in use.  Re-use the same password for different systems.  Use the “browser save” feature.
  • 20. BiometricsBiometrics  Identification based on a unique biological trait, such as:  a fingerprint  voice or iris pattern  retinal scan  hand geometry  face recognition  ear pattern  smell  blood vessels in the palm  gait recognition
  • 21. Antivirus SoftwareAntivirus Software  Computer programs that can locate and eradicate viruses and other malicious programs from scanned memory sticks, storage devices, individual computers, and networks
  • 22. Spyware Detection SoftwareSpyware Detection Software  Spyware  a type of software that installs itself without the user’s permission, collects passwords, PIN numbers, and account numbers and sends them to another party  Spyware Detection Software  Detects and eliminates spyware
  • 23. The Impact of the InternetThe Impact of the Internet  Introduces new threats  E-mail and instant messages may carry personal health information that can be intercepted  Unapproved use of messages or Web sites can introduce malicious programs  Web sites used for personal health information may be inappropriately accessed
  • 24. Implications for Mobile ComputingImplications for Mobile Computing  Devices are easily stolen.  Devices should require authentication and encryption to safeguard information security.  Devices should never be left where information may be seen by unauthorized viewers.
  • 25.  Verify wireless networks before use.  Responsibility for information and information system security is shared
  • 26. The ten security principles 1. Accountability for information : Organizations that collect, use or disclose PHI are responsible for the personal health information in their custody or care. A named individual within the organization should be responsible for facilitating organizational compliance with applicable data protection legislation and organizational privacy policies.
  • 27. 2. Identifying purposes for collection , use and disclosure of information : To allow patients to make appropriate decisions about their PHI, it is important that they be made aware of the purposes for which this information is being collected, used, and disclosed. There are many legitimate purposes for collecting personal health information; indeed, an international standard classification of such purposes has been developed
  • 28. These purposes include: • providing clinical care to an individual • providing emergency care to an individual • supporting care activities for the individual within the healthcare organization. • enabling medical billing (and/or permissions from a funding party for providing health care services to the patient ) • health service management and quality assurance • education for health care professionals • public health surveillance and disease control
  • 29. 3. Consent : An organisation should be able to demonstrate that it is in compliance with applicable laws and that the patient can reasonably be expected to know that information about them was going to be collected and used for defined purposes.
  • 30. 4. Limiting collection : Organisations should limit collection of personal health information to that which is necessary for the identified purposes; i.e. personal health information should not be collected indiscriminately Historically, many fields of data (e.g., religion and race) were collected in patient records, even in cases where they had little or no bearing on treatment and care.
  • 31. 5. Limiting use , disclosure and retention : Once organisations identify the purposes for which they collect personal and seek consent 6. Accuracy : The need for accuracy as a fair information practice is particularly relevant in the delivery of healthcare.
  • 32. 7. Safeguards : By implementing information security safeguards, organisations protect personal health information against loss and theft, as well as unauthorized access, disclosure, copying, use, and modification. 8. Openness : It should be possible for concerned patients to know the purposes for which information about them is collected, used, and disclosed.
  • 33. 9. Individual access : Patients should have the right to access their own personal health information so that they can assure its accuracy, and amend inaccurate or incomplete information 10. Challenging compliance : The right of a patient to lodge a privacy complaint against an organization was fi rst articulated when the Fair Information Practices were promulgated more than 40 years ago
  • 34. Reference Hebda, T. & Czar, P. (2013). Handbook of informatics for nurses and health care professionals (5th  ed.). Upper Saddle River, New Jersey: Pearson. 

Editor's Notes

  1. inadvertent غير مقصود
  2. Revenge الانتقام
  3. Pirated المقرصنة
  4. Iris قزحية العين
  5. instant الفورية