Legal and Ethical Considerations in Nursing Informatics
-
Upload
kimarie-brown -
Category
Healthcare
-
view
1.398 -
download
5
Transcript of Legal and Ethical Considerations in Nursing Informatics
![Page 1: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/1.jpg)
LEGAL AND ETHICAL CONSIDERATIONS IN NURSING INFORMATICSInformation Security and Confidentiality
![Page 2: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/2.jpg)
Learning OutcomesLearning Outcomes
1. Differentiate between privacy, confidentiality, information privacy, and information security.
2. Discuss how information system security affects privacy, confidentiality, and security.
3. Identify potential threats to system security and information.
![Page 3: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/3.jpg)
Learning OutcomesLearning Outcomes
4. Discuss security measures designed to protect information.
5. Compare and contrast available methods of authentication in terms of levels of security, costs, and ease of use.
6. Distinguish between appropriate and inappropriate password selection and processing.
![Page 4: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/4.jpg)
Learning OutcomesLearning Outcomes
7. Identify common examples of confidential forms and communication seen in healthcare settings and identify proper disposal techniques for each.
8. Discuss the impact that Internet technology has on the security of health-related information.
![Page 5: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/5.jpg)
SecuritySecurity
Information security and confidentiality of personal information represent major concerns in today’s society amidst growing reports of stolen and compromised information.
![Page 6: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/6.jpg)
ConfidentialityConfidentiality
In the USA, the protection of healthcare information is mandated by the Health Insurance Portability and Accountability Act (HIPAA) and the Joint Commission requirements.
![Page 7: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/7.jpg)
PrivacyPrivacy
A state of mind, freedom from intrusion, or control over the exposure of self or of personal information
![Page 8: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/8.jpg)
Significance of PrivacySignificance of Privacy
Key concept to understanding significance of information security and privacy
Includes right to determine what information is collected, how it is used, and the ability to review collected information for accuracy and security
International movement to protect privacy
![Page 9: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/9.jpg)
ConfidentialityConfidentiality
A situation in which a relationship has been established and private information is shared with the expectation that it will not be re-disclosed
Key to client treatment
![Page 10: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/10.jpg)
Information/Data PrivacyInformation/Data Privacy
The right to choose the conditions and extent to which information and beliefs are shared and the right to ensure accuracy of information collected
![Page 11: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/11.jpg)
Information SecurityInformation Security
…the protection of information against threats to its integrity, inadvertent disclosure, or availability determines the survivability of a system
![Page 12: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/12.jpg)
Information System SecurityInformation System Security
Ongoing protection of both information housed on the system and the system itself from threats or disruption
Primary goals
Protection of client confidentiality Protection of information integrity Ready availability of information when needed
![Page 13: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/13.jpg)
Security PlanningSecurity Planning
Saves time and money
Guards against: Downtime Breeches in confidentiality Loss of consumer confidence Cybercrime Liability Lost productivity
Helps ensure compliance with regulatory body/laws
![Page 14: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/14.jpg)
Steps to SecuritySteps to Security
Assessment of risks and assets
An organizational plan
A “culture” of security
The establishment and enforcement of policies
![Page 15: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/15.jpg)
Threats to System Security Threats to System Security and Informationand Information Thieves
Hackers and crackers
Denial of service attacks
Terrorists
Viruses, worms
Flooding sites
Power fluctuations
Revenge attacks
![Page 16: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/16.jpg)
Threats to System Security Threats to System Security and Informationand Information Pirated Web sites
Poor password management
Compromised device
Fires and natural disasters
Human error
Unauthorized insider access
![Page 17: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/17.jpg)
Security Measures Security Measures
• Firewalls– barrier created from software and hardware
• Antivirus and spyware detection
• User sign-on and passwords or other means of identity management
• Access on a need-to-know basis- level of access
• Automatic sign-off
• Physical restrictions to system access
![Page 18: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/18.jpg)
Identity ManagementIdentity Management
Area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity
![Page 19: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/19.jpg)
AuthenticationAuthentication
Process of determining whether someone is who he or she professes to be
Methods: access codes logon passwords digital certificates public or private keys used for encryption and
biometric measures
![Page 20: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/20.jpg)
PasswordPassword
Collection of alphanumeric characters that the user types into the computer
May be required after the entry of an access code or user name
Assigned after successful system training
Inexpensive but not the most effective means of authentication
![Page 21: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/21.jpg)
Password Selection and Password Selection and HandlingHandling
Do: Choose passwords that
are 8-12 characters long.
Avoid obvious passwords.
Keep your password private- ie, do not share.
Change password frequently.
Do not: Post or write down
passwords.
Leave computers or applications running when not in use.
Re-use the same password for different systems.
Use the “browser save” feature.
![Page 22: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/22.jpg)
BiometricsBiometrics
Identification based on a unique biological trait, such as: a fingerprint voice or iris pattern retinal scan hand geometry face recognition ear pattern smell blood vessels in the palm gait recognition
![Page 23: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/23.jpg)
Antivirus SoftwareAntivirus Software
Computer programs that can locate and eradicate viruses and other malicious programs from scanned memory sticks, storage devices, individual computers, and networks
![Page 24: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/24.jpg)
Spyware Detection SoftwareSpyware Detection Software
Spyware a type of software that installs itself without
the user’s permission, collects passwords, PIN numbers, and account numbers and sends them to another party
Spyware Detection Software Detects and eliminates spyware
![Page 25: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/25.jpg)
Proper Handling and Disposal Proper Handling and Disposal
Acceptable uses
Audit trails to monitor access
Encourage review for accuracy
Establish controls for information use after hours and off site
Shred or use locked receptacles for the disposal of items containing personal health information
![Page 26: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/26.jpg)
The Impact of the InternetThe Impact of the Internet
Introduces new threats E-mail and instant messages may carry
personal health information that can be intercepted
Unapproved use of messages or Web sites can introduce malicious programs
Web sites used for personal health information may be inappropriately accessed
![Page 27: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/27.jpg)
Implications for Mobile Implications for Mobile ComputingComputing Devices are easily stolen.
Devices should require authentication and encryption to safeguard information security.
Devices should never be left where information may be seen by unauthorized viewers.
Verify wireless networks before use.
![Page 28: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/28.jpg)
Implications for Mobile Implications for Mobile ComputingComputing
Responsibility for information and information system security is shared
![Page 29: Legal and Ethical Considerations in Nursing Informatics](https://reader030.fdocuments.net/reader030/viewer/2022020116/55a5ffe31a28ab653e8b45f3/html5/thumbnails/29.jpg)
Reference
Hebda, T. & Czar, P. (2013). Handbook of informatics for nurses and health care professionals (5th ed.). Upper Saddle River, New Jersey: Pearson.