SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
Ethical & Legal 
 Issues for Health IT 
in Thailand’s Context

               Nawanan Theera‐Ampornpunt, MD, PhD
               August 23, 2012




 Except where 
 citing other works
Why Important in Informatics?
          Leads to patient outcomes, including deaths
          Provider‐patient relationship threatened by IT?
          “Rationing” of health care through CDSS
          Information risks
          Research ethics
          Informatics practitioners as “professionals” 
           with specific skills, training, & competencies?
          Most common question “Who owns the data?”


Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
Relevant Ethical Principles
   Non‐maleficence
       “Do no harm”
   Beneficence
       Provide benefits to patients
   Justice
       Fair distribution of benefits, risks & costs
   Respect for Autonomy
       Respect decisions made and rights to make 
        decisions by individual persons
Appropriate Use of Health IT
       Standard view
        With uncertainties around new technology, 
         “scientific evidence counsels caution and 
         prudence.”
        Evidence & reason determine appropriate level 
         of caution
        If such systems improve care at acceptable cost 
         in time & money, there’s an obligation to use it
        Follows evolving evidence and standards of 
         care
Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
Appropriate Use of Health IT
       Standard view
        For computer‐assisted clinical diagnosis CDS, 
         human cognitive processes are more suited to 
         complex task of diagnosis than machine, and 
         should not be overridden or trumped by 
         computers.
        When adequate CDS tools are developed, they 
         should be viewed and used as supplementary 
         and subservient to human clinical judgment


Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
Fundamental Theorem of Informatics
               (Friedman, 2009)
Appropriate Use of Health IT
       Standard view
        Practitioners have obligation to use tools 
         responsibly, through adequate training & 
         understanding the system’s abilities & 
         limitations
        Practitioners must not ignore their clinical 
         judgment reflexively when using CDS.




Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
Appropriate Use of Health IT
          Health IT “should be used in clinical practice 
           only after appropriate evaluation of its efficacy 
           and the documentation that it performs its 
           intended task at an acceptable cost in time & 
           money”
          Qualified (licensed, trained & experienced) 
           health professionals as users
          Systems should be used to 
           augment/supplement, rather than replace or 
           supplant individuals’ decision making
          Adequate training

Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
Ethics for Developers
          Follow standard of care & scientific progress 
           (evidence‐based)
          System evaluation is ethically imperative




Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
Privacy & Security
   Privacy: “The ability of an individual or group 
    to seclude themselves or information about 
    themselves and thereby reveal themselves 
    selectively.” (Wikipedia)
   Security: “The degree of protection to safeguard 
    ... person against danger, damage, loss, and 
    crime.” (Wikipedia)
   Information Security: “Protecting information 
    and information systems from unauthorized 
    access, use, disclosure, disruption, modification, 
    perusal, inspection, recording or destruction” 
    (Wikipedia)
Information Security




   Confidentiality
   Integrity
   Availability
Security Safeguards
   Physical Security
   System Security
       Antivirus, Firewall, Intrusion Detection/Prevention 
        System, Log files, Monitoring
   Software Security
   Network Security
   Database Security
   User Security
      User account management

      Education against phishing/social engineering

   Encryption
Social Engineering Examples
       Dear mail.mahidol.ac.th Email Account User,

       We wrote to you on 11th January 2010 advising that you change the password on
       your account in order to prevent any unauthorised account access following
       the network instruction we previously communicated.

       all Mailhub systems will undergo regularly scheduled maintenance. Access
       to your e‐mail via the Webmail client will be unavailable for some time
       during this maintenance period. We are currently upgrading our data base
       and e‐mail account center i.e homepage view. We shall be deleting old
       [https://mail.mahidol.ac.th/l accounts which are no longer active to create
       more space for new accountsusers. we have also investigated a system wide
       security audit to improve and enhance
       our current security.

       In order to continue using our services you are require to update and
       re‐comfirmed your email account details as requested below. To complete
       your account re‐comfirmation,you must reply to this email immediately and
       enter your account
       details as requested below.

       Username :
       Password :
       Date of Birth:
       Future Password :
Real social‐engineering e‐mail received by Speaker
Phishing




Real phishing e‐mail received by Speaker
Privacy Safeguards
         Security safeguards
         Informed consent
         Privacy culture
         User awareness building & education
         Organizational policy & regulations
         Enforcement
         Ongoing privacy & security assessments, monitoring, 
          and protection




Image: http://www.nurseweek.com/news/images/privacy.jpg
Other Security Concepts & Techniques
   Authentication & Authorization
   Role‐based access control
   Two‐factor authentication
   Audit trails

HIPAA
 Personal Health Information (PHI)

       Any individually identifiable health information about a 
        patient that is created, received, processed, or stored by a 
        health plan, clearinghouse, or provider
   Deidentified
HIPAA (U.S.)
   Health Insurance Portability and Accountability Act of 1996
   More stringent state privacy laws apply
   HIPAA Privacy Rule
       Regulates use & disclosure of protected health information held by 
        covered entities
       Covered Entities: Health plans, providers, clearing houses, and their 
        business associates
       Protected Health Information (PHI): Any individually identifiable 
        health information about a patient
   HIPAA Security Rule
       Lays out security safeguards required for compliance
            Administrative safeguards, Physical safeguards, Technical safeguards
   New in HITECH Act of 2009
       Breach notification
Protected Health Information –
       Personal Identifiers in PHI
          Name                                                     Account No.
          Address                                                  Certificate/License No.
          Phone number                                             Device ID No.
          Fax number                                               Vehicle ID No.
          E‐mail address                                           Drivers license No.
          SSN                                                      URL
          Birthdate                                                IP Address
          Medical Record No.                                       Biometric identifier 
          Health Plan ID                                            including fingerprints
          Treatment date                                           Full face photo



From a slide by David S. Pieczkiewicz for a Health Informatics II class (2006) at the University of Minnesota
Under HIPAA Privacy Rule
   Some permitted uses and disclosures
   Treatment, payment, health care operations
       Quality improvement
       Competency assurance
       Medical reviews & audits
       Insurance functions
       Business planning & administration
       General administrative activities
Health Information Privacy Law: 
    U.S. Challenges
   Conflicts between federal vs. state laws
   Variations among state laws of different 
    states
   HIPAA only covers “covered entities”
   No general privacy laws in place, only a few 
    sectoral privacy laws e.g. HIPAA
Health Information Privacy Law: 
    Other Western Countries
   Canada ‐ The Privacy Act (1983), Personal 
    Information Protection and Electronic Data 
    Act of 2000
   EU Countries ‐ EU Data Protection Directive
   UK ‐ Data Protection Act 1998
   Austria ‐ Data Protection Act 2000
   Australia ‐ Privacy Act of 1988
   Germany ‐ Federal Data Protection Act of 
    2001
Hippocratic Oath
      ...


      What I may see or hear in the course of 
      treatment or even outside of the 
      treatment in regard to the life of men, 
      which on no account one must spread 
      abroad, I will keep myself holding such 
      things shameful to be spoken about.
      ...




http://en.wikipedia.org/wiki/Hippocratic_Oath
Thai ICT Laws
          Copyright Act, B.E. 2537
          พรบ.ลิขสิทธิ ์ พ.ศ. 2537
          And other IP laws (e.g. Patent Act)
               Important for intellectual property 
                considerations (e.g. who owns the 
                software source code of an in‐house 
                or outsourced system?)


Not considered professional legal opinion
Thai ICT Laws
          Computer‐Related Crimes Act, B.E. 2550
          พรบ.การกระทําความผิดเกียวกับคอมพิวเตอร์ พ.ศ. 2550
                                  ่
               Focuses on prosecuting computer 
                crimes & computer‐related crimes
               Responsibility of organizations as IT 
                service provider: Logging & 
                provision of access data to authorities


Not considered professional legal opinion
Thai ICT Laws
          Electronic Transactions Acts, B.E. 2544 & 2551
          พรบ.ว่าด้วยธุรกรรมทางอิเล็กทรอนิกส์ พ.ศ. 2544 และ พรบ.ว่าด้วยธุรกรรม
           ทางอิเล็กทรอนิกส์ (ฉบับที่ 2) พ.ศ. 2551
               Legal binding of electronic transactions and 
                electronic signatures
               Security & privacy requirements for
                  Determining legal validity & integrity of 
                   electronic transactions and documents, print‐
                   outs, & paper‐to‐electronic conversions
                  Governmental & public organizations

                  Critical infrastructures

                  Financial sectors

                  Electronic certificate authorities


Not considered professional legal opinion
Thai Privacy Laws
          No universal personal data privacy law 
           (Draft law has been proposed)
          National Health Act, B.E. 2550
          พรบ.สุขภาพแห่งชาติ พ.ศ. 2550
          “มาตรา 7 ข้อมูลด้านสุขภาพของบุคคล เป็ นความลับส่วนบุคคล
           ผูใดจะนําไปเปิดเผยในประการทีน่าจะทําให้บุคคลนันเสียหายไม่ได้
             ้                           ่               ้
           เว้นแต่การเปิดเผยนันเป็ นไปตามความประสงค์ของบุคคลนัน
                              ้                                 ้
           โดยตรง หรือมีกฎหมายเฉพาะบัญญัตให้ตองเปิดเผย แต่ไม่วาใน
                                             ิ ้                  ่
           กรณีใด ๆ ผูใดจะอาศัยอํานาจหรือสิทธิตามกฎหมายว่าด้วยข้อมูล
                       ้
           ข่าวสารของราชการหรือกฎหมายอืนเพือขอเอกสารเกียวกับข้อมูล
                                           ่ ่             ่
           ด้านสุขภาพของบุคคลทีไม่ใช่ของตนไม่ได้”
                                 ่
Not considered professional legal opinion
Thai Privacy Laws
        The Sanatorium Acts, B.E. 2541 & 
         2547
        พรบ.สถานพยาบาล พ.ศ. 2541 และ พรบ.สถานพยาบาล
         (ฉบับที่ 2) พ.ศ. 2547
        ประกาศกระทรวงสาธารณสุข ฉบับที่ 3 (พ.ศ. 2542) เรือง
                                                         ่
         ชนิดหรือประเภทของการรักษาพยาบาล การบริการอื่นของ
                                 ้ ่ ่ ้ั
         สถานพยาบาลและสิทธิของผูปวยซึงผูรบอนุญาตจะต้องแสดง
         ตามมาตรา 32 (3)
Not considered professional legal opinion
Thai Privacy Laws
       คําประกาศสิทธิของผูป่วย ้
       “...
             ้ ่
       7. ผูปวยมีสทธิทจะได้รบการปกปิดข้อมูลเกียวกับตนเอง จากผู้
                    ิ ่ี         ั                ่
       ประกอบวิชาชีพโดยเคร่งครัด เว้นแต่จะได้รบความยินยอมจากผูปวย
                                              ั                   ้ ่
       หรือการปฏิบตหน้าทีตามกฎหมาย
                      ั ิ    ่
       ...
              ้ ่
       9. ผูปวยมีสทธิทจะได้รบทราบข้อมูลเกียวกับรักษาพยาบาลเฉพาะ
                     ิ ่ี          ั       ่
       ของตนทีปรากฏในเวชระเบียนเมือร้องขอ ทังนี้ ข้อมูลดังกล่าวต้องไม่
                  ่                  ่          ้
       เป็ นการละเมิดสิทธิสวนตัวของบุคคลอืน
                           ่             ่
       ...”
Not considered professional legal opinion
Thai Privacy Laws
          The Official Information Act, B.E. 2540
        พรบ.ข้อมูลข่าวสารของราชการ พ.ศ. 2540

        “เปิ ดเผยเป็ นหลัก ปกปิ ดเป็ นข้อยกเว้น”
       “มาตรา 15 ข้อมูลข่าวสารของราชการทีมลกษณะอย่างหนึ่งอย่างใดดังต่อไปนี้
                                                ่ ีั
       หน่วยงานของรัฐหรือเจ้าหน้าทีของรัฐอาจมีคาสังมิให้เปิดเผยก็ได้ โดยคํานึงถึง
                                      ่            ํ ่
       การปฏิบตหน้าทีตามกฎหมาย...ประกอบกัน
                   ั ิ ่
       ...
       (5) รายงานการแพทย์หรือข้อมูลข่าวสารส่วนบุคคลซึงการเปิดเผยจะเป็ นการรุก
                                                         ่
       ลํ้าสิทธิสวนบุคคลโดยไม่สมควร
                 ่
       (6) ข้อมูลข่าวสารของราชการทีมกฎหมายคุมครองมิให้เปิดเผย...
                                        ่ ี          ้
       ...”

Not considered professional legal opinion
Health Information Privacy Law: 
        Thailand’s Challenges
       Official Information Act only covers 
        governmental organizations
       “Disclose as a rule, protect as an exception” 
        not appropriate mindset for health 
        information
       National Health Act: One blanket provision 
        with minimal exceptions: raising concerns 
        about enforceability (in exceptional 
        circumstances, e.g. disasters)
Not considered professional legal opinion
Health Information Privacy Law: 
        Thailand’s Challenges
       No general data privacy law in place
       Unclear implications from ICT laws (e.g. 
        Electronic Transactions Act)
       Governance: No governmental authority 
        responsible for oversight, enforcement & 
        regulation of health information privacy 
        protections
       Policy: No systematic national policy to 
        promote privacy protections
Not considered professional legal opinion
We Need A Better Information 
          Privacy Law That Takes Into 
         Account the Unique Nature of 
           Health Information and the 
              Various Use Cases & 
        Contingencies in Use & Disclosure 
            of Health Information in 
               Thailand’s Context
                                     Nawanan Theera‐Ampornpunt
Not considered professional legal opinion
Privacy: The Cultural Aspect




                   From Flickr by Bikoy (Victor Villanueva)
Privacy: The Cultural Aspect




                          From Flickr by Saikofish
Extra
       Can the electronic data in EHRs be used in 
        court or for other legal purposes? If so, to 
        what extent and under what legal 
        provisions?

       I wrote a personal opinion on this in March 
        2012. Not a professional legal opinion and 
        only based on Ramathibodi’s context, but 
        would be happy to share.
Not considered professional legal opinion

Weitere ähnliche Inhalte

Was ist angesagt?

The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceJim Anfield
 
Pdpa presentation
Pdpa presentationPdpa presentation
Pdpa presentationAlan Teh
 
HSCIC IG Training - The Beginners’ Guide To Information Governance
HSCIC IG Training - The Beginners’ Guide To Information GovernanceHSCIC IG Training - The Beginners’ Guide To Information Governance
HSCIC IG Training - The Beginners’ Guide To Information GovernanceLGT_IG_Department
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007Richard Moore
 
Technologies and procedures for HIPAA compliance
Technologies and procedures for HIPAA complianceTechnologies and procedures for HIPAA compliance
Technologies and procedures for HIPAA complianceJack Shaffer
 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for StartupsObaa, Inc.
 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceTrueVault
 
ICT Solutions for Management of health sector resources
ICT Solutions for Management of health sector resourcesICT Solutions for Management of health sector resources
ICT Solutions for Management of health sector resourcesUSAID CEED II Project Moldova
 
Mobile devices and applications in healthcare: Security and Compliance Risks
Mobile devices and applications in healthcare: Security and Compliance RisksMobile devices and applications in healthcare: Security and Compliance Risks
Mobile devices and applications in healthcare: Security and Compliance Risksdata brackets
 
DSA/M3 Serviceofferings
DSA/M3 ServiceofferingsDSA/M3 Serviceofferings
DSA/M3 Serviceofferingsmarymaz
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...Quinnipiac University
 
HIPAA Email Compliance & Privacy
HIPAA Email Compliance & PrivacyHIPAA Email Compliance & Privacy
HIPAA Email Compliance & Privacyappriver
 
Article on The Electronic Health Record
Article on The Electronic Health RecordArticle on The Electronic Health Record
Article on The Electronic Health RecordAnurag Deb
 
IRJET- A Study on Improving the Effectiveness of Medical Emergency Servic...
IRJET-  	  A Study on Improving the Effectiveness of Medical Emergency Servic...IRJET-  	  A Study on Improving the Effectiveness of Medical Emergency Servic...
IRJET- A Study on Improving the Effectiveness of Medical Emergency Servic...IRJET Journal
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MassEHealth
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsAHMED ZINHOM
 

Was ist angesagt? (18)

The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA Compliance
 
Pdpa presentation
Pdpa presentationPdpa presentation
Pdpa presentation
 
HSCIC IG Training - The Beginners’ Guide To Information Governance
HSCIC IG Training - The Beginners’ Guide To Information GovernanceHSCIC IG Training - The Beginners’ Guide To Information Governance
HSCIC IG Training - The Beginners’ Guide To Information Governance
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 
Technologies and procedures for HIPAA compliance
Technologies and procedures for HIPAA complianceTechnologies and procedures for HIPAA compliance
Technologies and procedures for HIPAA compliance
 
HIPAA 101 for Startups
HIPAA 101 for StartupsHIPAA 101 for Startups
HIPAA 101 for Startups
 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA Compliance
 
ICT Solutions for Management of health sector resources
ICT Solutions for Management of health sector resourcesICT Solutions for Management of health sector resources
ICT Solutions for Management of health sector resources
 
Mobile devices and applications in healthcare: Security and Compliance Risks
Mobile devices and applications in healthcare: Security and Compliance RisksMobile devices and applications in healthcare: Security and Compliance Risks
Mobile devices and applications in healthcare: Security and Compliance Risks
 
DSA/M3 Serviceofferings
DSA/M3 ServiceofferingsDSA/M3 Serviceofferings
DSA/M3 Serviceofferings
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
HIPAA Email Compliance & Privacy
HIPAA Email Compliance & PrivacyHIPAA Email Compliance & Privacy
HIPAA Email Compliance & Privacy
 
Article on The Electronic Health Record
Article on The Electronic Health RecordArticle on The Electronic Health Record
Article on The Electronic Health Record
 
IRJET- A Study on Improving the Effectiveness of Medical Emergency Servic...
IRJET-  	  A Study on Improving the Effectiveness of Medical Emergency Servic...IRJET-  	  A Study on Improving the Effectiveness of Medical Emergency Servic...
IRJET- A Study on Improving the Effectiveness of Medical Emergency Servic...
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15
 
Legal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informaticsLegal and ethical considerations in nursing informatics
Legal and ethical considerations in nursing informatics
 

Andere mochten auch

Understanding Ethical and Social Issues Related to Systems
Understanding Ethical and Social Issues Related to SystemsUnderstanding Ethical and Social Issues Related to Systems
Understanding Ethical and Social Issues Related to SystemsAlbrecht Jones
 
Pal gov.tutorial6.session2. ethical and social issues
Pal gov.tutorial6.session2. ethical and social issuesPal gov.tutorial6.session2. ethical and social issues
Pal gov.tutorial6.session2. ethical and social issuesMustafa Jarrar
 
Cris consent public
Cris consent publicCris consent public
Cris consent publickclcompbio
 
Data colonization
Data colonizationData colonization
Data colonizatione-Marefa
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the LawBrian Ahier
 
Ethics, Informatics and Obamacare
Ethics, Informatics and ObamacareEthics, Informatics and Obamacare
Ethics, Informatics and ObamacareBarry Smith
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital HealthMegan Ranney
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Saide OER Africa
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Nawanan Theera-Ampornpunt
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingNawanan Theera-Ampornpunt
 
Introduction to ethical issues in public health, Public Health Institute (PHI...
Introduction to ethical issues in public health, Public Health Institute (PHI...Introduction to ethical issues in public health, Public Health Institute (PHI...
Introduction to ethical issues in public health, Public Health Institute (PHI...Dr Ghaiath Hussein
 
Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online Year of the X
 
Eysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsEysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsGunther Eysenbach
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 

Andere mochten auch (20)

E. Whishaw
E. WhishawE. Whishaw
E. Whishaw
 
Understanding Ethical and Social Issues Related to Systems
Understanding Ethical and Social Issues Related to SystemsUnderstanding Ethical and Social Issues Related to Systems
Understanding Ethical and Social Issues Related to Systems
 
Pal gov.tutorial6.session2. ethical and social issues
Pal gov.tutorial6.session2. ethical and social issuesPal gov.tutorial6.session2. ethical and social issues
Pal gov.tutorial6.session2. ethical and social issues
 
anchal
anchalanchal
anchal
 
Cris consent public
Cris consent publicCris consent public
Cris consent public
 
Data colonization
Data colonizationData colonization
Data colonization
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the Law
 
Ethics, Informatics and Obamacare
Ethics, Informatics and ObamacareEthics, Informatics and Obamacare
Ethics, Informatics and Obamacare
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital Health
 
Mdh ethics in social media pdf
Mdh ethics in social media pdfMdh ethics in social media pdf
Mdh ethics in social media pdf
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision Making
 
Introduction to ethical issues in public health, Public Health Institute (PHI...
Introduction to ethical issues in public health, Public Health Institute (PHI...Introduction to ethical issues in public health, Public Health Institute (PHI...
Introduction to ethical issues in public health, Public Health Institute (PHI...
 
Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online Digital Ethics : Helping your brain to make decisions online
Digital Ethics : Helping your brain to make decisions online
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3
 
Eysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsEysenbach: Consumer health informatics
Eysenbach: Consumer health informatics
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 

Ähnlich wie Ethical & Legal Issues for Health IT in Thailand's Context

Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Deven McGraw
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )Tasha Holloway
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptJohnLagman3
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docxteresehearn
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
Modernizing Patient Records
Modernizing Patient RecordsModernizing Patient Records
Modernizing Patient RecordsBob Larrivee
 
Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareVaileth Mdete
 
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docxRunning head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docxtodd271
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13pneville0629
 
C:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleC:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleBrenda Kershaw
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOsnobumoto
 

Ähnlich wie Ethical & Legal Issues for Health IT in Thailand's Context (20)

Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Scary acronyms
Scary acronymsScary acronyms
Scary acronyms
 
Data security training
Data security trainingData security training
Data security training
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Modernizing Patient Records
Modernizing Patient RecordsModernizing Patient Records
Modernizing Patient Records
 
Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health Care
 
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docxRunning head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
Running head DATA PRIVACY 1 DATA PRIVACY10Short- and .docx
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
 
C:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleC:\Fakepath\Secprimodule
C:\Fakepath\Secprimodule
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 

Mehr von Nawanan Theera-Ampornpunt

Health Informatics for Health Service Systems (March 11, 2024)
Health Informatics for Health Service Systems (March 11, 2024)Health Informatics for Health Service Systems (March 11, 2024)
Health Informatics for Health Service Systems (March 11, 2024)Nawanan Theera-Ampornpunt
 
Personal Data Protection Act and the Four Subordinate Laws (February 29, 2024)
Personal Data Protection Act and the Four Subordinate Laws (February 29, 2024)Personal Data Protection Act and the Four Subordinate Laws (February 29, 2024)
Personal Data Protection Act and the Four Subordinate Laws (February 29, 2024)Nawanan Theera-Ampornpunt
 
Privacy & PDPA Awareness Training for Ramathibodi Residents (October 5, 2023)
Privacy & PDPA Awareness Training for Ramathibodi Residents (October 5, 2023)Privacy & PDPA Awareness Training for Ramathibodi Residents (October 5, 2023)
Privacy & PDPA Awareness Training for Ramathibodi Residents (October 5, 2023)Nawanan Theera-Ampornpunt
 
Case Study PDPA Workshop (September 15, 2023)
Case Study PDPA Workshop (September 15, 2023)Case Study PDPA Workshop (September 15, 2023)
Case Study PDPA Workshop (September 15, 2023)Nawanan Theera-Ampornpunt
 
Case Studies on Overview of PDPA and its Subordinate Laws (September 15, 2023)
Case Studies on Overview of PDPA and its Subordinate Laws (September 15, 2023)Case Studies on Overview of PDPA and its Subordinate Laws (September 15, 2023)
Case Studies on Overview of PDPA and its Subordinate Laws (September 15, 2023)Nawanan Theera-Ampornpunt
 
Ramathibodi Security & Privacy Awareness Training (Fiscal Year 2023)
Ramathibodi Security & Privacy Awareness Training (Fiscal Year 2023)Ramathibodi Security & Privacy Awareness Training (Fiscal Year 2023)
Ramathibodi Security & Privacy Awareness Training (Fiscal Year 2023)Nawanan Theera-Ampornpunt
 
Relationship Between Thailand's Official Information Act and Personal Data Pr...
Relationship Between Thailand's Official Information Act and Personal Data Pr...Relationship Between Thailand's Official Information Act and Personal Data Pr...
Relationship Between Thailand's Official Information Act and Personal Data Pr...Nawanan Theera-Ampornpunt
 
Social Media - PDPA: Is There A Way Out? (October 19, 2022)
Social Media - PDPA: Is There A Way Out? (October 19, 2022)Social Media - PDPA: Is There A Way Out? (October 19, 2022)
Social Media - PDPA: Is There A Way Out? (October 19, 2022)Nawanan Theera-Ampornpunt
 
Do's and Don'ts on PDPA for Doctors (May 31, 2022)
Do's and Don'ts on PDPA for Doctors (May 31, 2022)Do's and Don'ts on PDPA for Doctors (May 31, 2022)
Do's and Don'ts on PDPA for Doctors (May 31, 2022)Nawanan Theera-Ampornpunt
 
Telemedicine: A Health Informatician's Point of View
Telemedicine: A Health Informatician's Point of ViewTelemedicine: A Health Informatician's Point of View
Telemedicine: A Health Informatician's Point of ViewNawanan Theera-Ampornpunt
 
การบริหารความเสี่ยงคณะฯ (February 9, 2022)
การบริหารความเสี่ยงคณะฯ (February 9, 2022)การบริหารความเสี่ยงคณะฯ (February 9, 2022)
การบริหารความเสี่ยงคณะฯ (February 9, 2022)Nawanan Theera-Ampornpunt
 
จริยธรรมและกฎหมายที่เกี่ยวข้องกับเทคโนโลยีสารสนเทศทางสุขภาพ (February 8, 2022)
จริยธรรมและกฎหมายที่เกี่ยวข้องกับเทคโนโลยีสารสนเทศทางสุขภาพ (February 8, 2022)จริยธรรมและกฎหมายที่เกี่ยวข้องกับเทคโนโลยีสารสนเทศทางสุขภาพ (February 8, 2022)
จริยธรรมและกฎหมายที่เกี่ยวข้องกับเทคโนโลยีสารสนเทศทางสุขภาพ (February 8, 2022)Nawanan Theera-Ampornpunt
 
พระราชบัญญัติคุ้มครองข้อมูลส่วนบุคคล พ.ศ. 2562 (PDPA) (January 21, 2022)
พระราชบัญญัติคุ้มครองข้อมูลส่วนบุคคล พ.ศ. 2562 (PDPA) (January 21, 2022)พระราชบัญญัติคุ้มครองข้อมูลส่วนบุคคล พ.ศ. 2562 (PDPA) (January 21, 2022)
พระราชบัญญัติคุ้มครองข้อมูลส่วนบุคคล พ.ศ. 2562 (PDPA) (January 21, 2022)Nawanan Theera-Ampornpunt
 
Digital Health Transformation for Health Executives (January 18, 2022)
Digital Health Transformation for Health Executives (January 18, 2022)Digital Health Transformation for Health Executives (January 18, 2022)
Digital Health Transformation for Health Executives (January 18, 2022)Nawanan Theera-Ampornpunt
 
Updates on Privacy & Security Laws (November 26, 2021)
Updates on Privacy & Security Laws (November 26, 2021)Updates on Privacy & Security Laws (November 26, 2021)
Updates on Privacy & Security Laws (November 26, 2021)Nawanan Theera-Ampornpunt
 
Health Informatics for Clinical Research (November 25, 2021)
Health Informatics for Clinical Research (November 25, 2021)Health Informatics for Clinical Research (November 25, 2021)
Health Informatics for Clinical Research (November 25, 2021)Nawanan Theera-Ampornpunt
 
Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)Nawanan Theera-Ampornpunt
 
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...Nawanan Theera-Ampornpunt
 

Mehr von Nawanan Theera-Ampornpunt (20)

Health Informatics for Health Service Systems (March 11, 2024)
Health Informatics for Health Service Systems (March 11, 2024)Health Informatics for Health Service Systems (March 11, 2024)
Health Informatics for Health Service Systems (March 11, 2024)
 
Personal Data Protection Act and the Four Subordinate Laws (February 29, 2024)
Personal Data Protection Act and the Four Subordinate Laws (February 29, 2024)Personal Data Protection Act and the Four Subordinate Laws (February 29, 2024)
Personal Data Protection Act and the Four Subordinate Laws (February 29, 2024)
 
Privacy & PDPA Awareness Training for Ramathibodi Residents (October 5, 2023)
Privacy & PDPA Awareness Training for Ramathibodi Residents (October 5, 2023)Privacy & PDPA Awareness Training for Ramathibodi Residents (October 5, 2023)
Privacy & PDPA Awareness Training for Ramathibodi Residents (October 5, 2023)
 
Case Study PDPA Workshop (September 15, 2023)
Case Study PDPA Workshop (September 15, 2023)Case Study PDPA Workshop (September 15, 2023)
Case Study PDPA Workshop (September 15, 2023)
 
Case Studies on Overview of PDPA and its Subordinate Laws (September 15, 2023)
Case Studies on Overview of PDPA and its Subordinate Laws (September 15, 2023)Case Studies on Overview of PDPA and its Subordinate Laws (September 15, 2023)
Case Studies on Overview of PDPA and its Subordinate Laws (September 15, 2023)
 
Ramathibodi Security & Privacy Awareness Training (Fiscal Year 2023)
Ramathibodi Security & Privacy Awareness Training (Fiscal Year 2023)Ramathibodi Security & Privacy Awareness Training (Fiscal Year 2023)
Ramathibodi Security & Privacy Awareness Training (Fiscal Year 2023)
 
Relationship Between Thailand's Official Information Act and Personal Data Pr...
Relationship Between Thailand's Official Information Act and Personal Data Pr...Relationship Between Thailand's Official Information Act and Personal Data Pr...
Relationship Between Thailand's Official Information Act and Personal Data Pr...
 
Social Media - PDPA: Is There A Way Out? (October 19, 2022)
Social Media - PDPA: Is There A Way Out? (October 19, 2022)Social Media - PDPA: Is There A Way Out? (October 19, 2022)
Social Media - PDPA: Is There A Way Out? (October 19, 2022)
 
Do's and Don'ts on PDPA for Doctors (May 31, 2022)
Do's and Don'ts on PDPA for Doctors (May 31, 2022)Do's and Don'ts on PDPA for Doctors (May 31, 2022)
Do's and Don'ts on PDPA for Doctors (May 31, 2022)
 
Telemedicine: A Health Informatician's Point of View
Telemedicine: A Health Informatician's Point of ViewTelemedicine: A Health Informatician's Point of View
Telemedicine: A Health Informatician's Point of View
 
Meeting Management (March 2, 2022)
Meeting Management (March 2, 2022)Meeting Management (March 2, 2022)
Meeting Management (March 2, 2022)
 
การบริหารความเสี่ยงคณะฯ (February 9, 2022)
การบริหารความเสี่ยงคณะฯ (February 9, 2022)การบริหารความเสี่ยงคณะฯ (February 9, 2022)
การบริหารความเสี่ยงคณะฯ (February 9, 2022)
 
จริยธรรมและกฎหมายที่เกี่ยวข้องกับเทคโนโลยีสารสนเทศทางสุขภาพ (February 8, 2022)
จริยธรรมและกฎหมายที่เกี่ยวข้องกับเทคโนโลยีสารสนเทศทางสุขภาพ (February 8, 2022)จริยธรรมและกฎหมายที่เกี่ยวข้องกับเทคโนโลยีสารสนเทศทางสุขภาพ (February 8, 2022)
จริยธรรมและกฎหมายที่เกี่ยวข้องกับเทคโนโลยีสารสนเทศทางสุขภาพ (February 8, 2022)
 
พระราชบัญญัติคุ้มครองข้อมูลส่วนบุคคล พ.ศ. 2562 (PDPA) (January 21, 2022)
พระราชบัญญัติคุ้มครองข้อมูลส่วนบุคคล พ.ศ. 2562 (PDPA) (January 21, 2022)พระราชบัญญัติคุ้มครองข้อมูลส่วนบุคคล พ.ศ. 2562 (PDPA) (January 21, 2022)
พระราชบัญญัติคุ้มครองข้อมูลส่วนบุคคล พ.ศ. 2562 (PDPA) (January 21, 2022)
 
Digital Health Transformation for Health Executives (January 18, 2022)
Digital Health Transformation for Health Executives (January 18, 2022)Digital Health Transformation for Health Executives (January 18, 2022)
Digital Health Transformation for Health Executives (January 18, 2022)
 
Updates on Privacy & Security Laws (November 26, 2021)
Updates on Privacy & Security Laws (November 26, 2021)Updates on Privacy & Security Laws (November 26, 2021)
Updates on Privacy & Security Laws (November 26, 2021)
 
Hospital Informatics (November 26, 2021)
Hospital Informatics (November 26, 2021)Hospital Informatics (November 26, 2021)
Hospital Informatics (November 26, 2021)
 
Health Informatics for Clinical Research (November 25, 2021)
Health Informatics for Clinical Research (November 25, 2021)Health Informatics for Clinical Research (November 25, 2021)
Health Informatics for Clinical Research (November 25, 2021)
 
Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)
 
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...
Consumer Health Informatics, Mobile Health, and Social Media for Health: Part...
 

Kürzlich hochgeladen

Informed Consent Empowering Healthcare Decision-Making.pptx
Informed Consent Empowering Healthcare Decision-Making.pptxInformed Consent Empowering Healthcare Decision-Making.pptx
Informed Consent Empowering Healthcare Decision-Making.pptxSasikiranMarri
 
Primary headache and facial pain. (2024)
Primary headache and facial pain. (2024)Primary headache and facial pain. (2024)
Primary headache and facial pain. (2024)Mohamed Rizk Khodair
 
Case Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptxCase Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptxNiranjan Chavan
 
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
The next social challenge to public health: the information environment.pptx
The next social challenge to public health:  the information environment.pptxThe next social challenge to public health:  the information environment.pptx
The next social challenge to public health: the information environment.pptxTina Purnat
 
PNEUMOTHORAX AND ITS MANAGEMENTS.pdf
PNEUMOTHORAX   AND  ITS  MANAGEMENTS.pdfPNEUMOTHORAX   AND  ITS  MANAGEMENTS.pdf
PNEUMOTHORAX AND ITS MANAGEMENTS.pdfDolisha Warbi
 
SWD (Short wave diathermy)- Physiotherapy.ppt
SWD (Short wave diathermy)- Physiotherapy.pptSWD (Short wave diathermy)- Physiotherapy.ppt
SWD (Short wave diathermy)- Physiotherapy.pptMumux Mirani
 
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...Wessex Health Partners
 
PULMONARY EMBOLISM AND ITS MANAGEMENTS.pdf
PULMONARY EMBOLISM AND ITS MANAGEMENTS.pdfPULMONARY EMBOLISM AND ITS MANAGEMENTS.pdf
PULMONARY EMBOLISM AND ITS MANAGEMENTS.pdfDolisha Warbi
 
Presentation on Parasympathetic Nervous System
Presentation on Parasympathetic Nervous SystemPresentation on Parasympathetic Nervous System
Presentation on Parasympathetic Nervous SystemPrerana Jadhav
 
Glomerular Filtration and determinants of glomerular filtration .pptx
Glomerular Filtration and  determinants of glomerular filtration .pptxGlomerular Filtration and  determinants of glomerular filtration .pptx
Glomerular Filtration and determinants of glomerular filtration .pptxDr.Nusrat Tariq
 
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara Rajendran
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara RajendranMusic Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara Rajendran
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara RajendranTara Rajendran
 
Measurement of Radiation and Dosimetric Procedure.pptx
Measurement of Radiation and Dosimetric Procedure.pptxMeasurement of Radiation and Dosimetric Procedure.pptx
Measurement of Radiation and Dosimetric Procedure.pptxDr. Dheeraj Kumar
 
epilepsy and status epilepticus for undergraduate.pptx
epilepsy and status epilepticus  for undergraduate.pptxepilepsy and status epilepticus  for undergraduate.pptx
epilepsy and status epilepticus for undergraduate.pptxMohamed Rizk Khodair
 
April 2024 ONCOLOGY CARTOON by DR KANHU CHARAN PATRO
April 2024 ONCOLOGY CARTOON by  DR KANHU CHARAN PATROApril 2024 ONCOLOGY CARTOON by  DR KANHU CHARAN PATRO
April 2024 ONCOLOGY CARTOON by DR KANHU CHARAN PATROKanhu Charan
 
Big Data Analysis Suggests COVID Vaccination Increases Excess Mortality Of ...
Big Data Analysis Suggests COVID  Vaccination Increases Excess Mortality Of  ...Big Data Analysis Suggests COVID  Vaccination Increases Excess Mortality Of  ...
Big Data Analysis Suggests COVID Vaccination Increases Excess Mortality Of ...sdateam0
 
LUNG TUMORS AND ITS CLASSIFICATIONS.pdf
LUNG TUMORS AND ITS  CLASSIFICATIONS.pdfLUNG TUMORS AND ITS  CLASSIFICATIONS.pdf
LUNG TUMORS AND ITS CLASSIFICATIONS.pdfDolisha Warbi
 
Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.ANJALI
 
Apiculture Chapter 1. Introduction 2.ppt
Apiculture Chapter 1. Introduction 2.pptApiculture Chapter 1. Introduction 2.ppt
Apiculture Chapter 1. Introduction 2.pptkedirjemalharun
 
COVID-19 (NOVEL CORONA VIRUS DISEASE PANDEMIC ).pptx
COVID-19  (NOVEL CORONA  VIRUS DISEASE PANDEMIC ).pptxCOVID-19  (NOVEL CORONA  VIRUS DISEASE PANDEMIC ).pptx
COVID-19 (NOVEL CORONA VIRUS DISEASE PANDEMIC ).pptxBibekananda shah
 

Kürzlich hochgeladen (20)

Informed Consent Empowering Healthcare Decision-Making.pptx
Informed Consent Empowering Healthcare Decision-Making.pptxInformed Consent Empowering Healthcare Decision-Making.pptx
Informed Consent Empowering Healthcare Decision-Making.pptx
 
Primary headache and facial pain. (2024)
Primary headache and facial pain. (2024)Primary headache and facial pain. (2024)
Primary headache and facial pain. (2024)
 
Case Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptxCase Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptx
 
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
The next social challenge to public health: the information environment.pptx
The next social challenge to public health:  the information environment.pptxThe next social challenge to public health:  the information environment.pptx
The next social challenge to public health: the information environment.pptx
 
PNEUMOTHORAX AND ITS MANAGEMENTS.pdf
PNEUMOTHORAX   AND  ITS  MANAGEMENTS.pdfPNEUMOTHORAX   AND  ITS  MANAGEMENTS.pdf
PNEUMOTHORAX AND ITS MANAGEMENTS.pdf
 
SWD (Short wave diathermy)- Physiotherapy.ppt
SWD (Short wave diathermy)- Physiotherapy.pptSWD (Short wave diathermy)- Physiotherapy.ppt
SWD (Short wave diathermy)- Physiotherapy.ppt
 
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
 
PULMONARY EMBOLISM AND ITS MANAGEMENTS.pdf
PULMONARY EMBOLISM AND ITS MANAGEMENTS.pdfPULMONARY EMBOLISM AND ITS MANAGEMENTS.pdf
PULMONARY EMBOLISM AND ITS MANAGEMENTS.pdf
 
Presentation on Parasympathetic Nervous System
Presentation on Parasympathetic Nervous SystemPresentation on Parasympathetic Nervous System
Presentation on Parasympathetic Nervous System
 
Glomerular Filtration and determinants of glomerular filtration .pptx
Glomerular Filtration and  determinants of glomerular filtration .pptxGlomerular Filtration and  determinants of glomerular filtration .pptx
Glomerular Filtration and determinants of glomerular filtration .pptx
 
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara Rajendran
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara RajendranMusic Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara Rajendran
Music Therapy's Impact in Palliative Care| IAPCON2024| Dr. Tara Rajendran
 
Measurement of Radiation and Dosimetric Procedure.pptx
Measurement of Radiation and Dosimetric Procedure.pptxMeasurement of Radiation and Dosimetric Procedure.pptx
Measurement of Radiation and Dosimetric Procedure.pptx
 
epilepsy and status epilepticus for undergraduate.pptx
epilepsy and status epilepticus  for undergraduate.pptxepilepsy and status epilepticus  for undergraduate.pptx
epilepsy and status epilepticus for undergraduate.pptx
 
April 2024 ONCOLOGY CARTOON by DR KANHU CHARAN PATRO
April 2024 ONCOLOGY CARTOON by  DR KANHU CHARAN PATROApril 2024 ONCOLOGY CARTOON by  DR KANHU CHARAN PATRO
April 2024 ONCOLOGY CARTOON by DR KANHU CHARAN PATRO
 
Big Data Analysis Suggests COVID Vaccination Increases Excess Mortality Of ...
Big Data Analysis Suggests COVID  Vaccination Increases Excess Mortality Of  ...Big Data Analysis Suggests COVID  Vaccination Increases Excess Mortality Of  ...
Big Data Analysis Suggests COVID Vaccination Increases Excess Mortality Of ...
 
LUNG TUMORS AND ITS CLASSIFICATIONS.pdf
LUNG TUMORS AND ITS  CLASSIFICATIONS.pdfLUNG TUMORS AND ITS  CLASSIFICATIONS.pdf
LUNG TUMORS AND ITS CLASSIFICATIONS.pdf
 
Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.
 
Apiculture Chapter 1. Introduction 2.ppt
Apiculture Chapter 1. Introduction 2.pptApiculture Chapter 1. Introduction 2.ppt
Apiculture Chapter 1. Introduction 2.ppt
 
COVID-19 (NOVEL CORONA VIRUS DISEASE PANDEMIC ).pptx
COVID-19  (NOVEL CORONA  VIRUS DISEASE PANDEMIC ).pptxCOVID-19  (NOVEL CORONA  VIRUS DISEASE PANDEMIC ).pptx
COVID-19 (NOVEL CORONA VIRUS DISEASE PANDEMIC ).pptx
 

Ethical & Legal Issues for Health IT in Thailand's Context

  • 1. Ethical & Legal  Issues for Health IT  in Thailand’s Context Nawanan Theera‐Ampornpunt, MD, PhD August 23, 2012 Except where  citing other works
  • 2. Why Important in Informatics?  Leads to patient outcomes, including deaths  Provider‐patient relationship threatened by IT?  “Rationing” of health care through CDSS  Information risks  Research ethics  Informatics practitioners as “professionals”  with specific skills, training, & competencies?  Most common question “Who owns the data?” Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
  • 3. Relevant Ethical Principles  Non‐maleficence  “Do no harm”  Beneficence  Provide benefits to patients  Justice  Fair distribution of benefits, risks & costs  Respect for Autonomy  Respect decisions made and rights to make  decisions by individual persons
  • 4. Appropriate Use of Health IT Standard view  With uncertainties around new technology,  “scientific evidence counsels caution and  prudence.”  Evidence & reason determine appropriate level  of caution  If such systems improve care at acceptable cost  in time & money, there’s an obligation to use it  Follows evolving evidence and standards of  care Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
  • 5. Appropriate Use of Health IT Standard view  For computer‐assisted clinical diagnosis CDS,  human cognitive processes are more suited to  complex task of diagnosis than machine, and  should not be overridden or trumped by  computers.  When adequate CDS tools are developed, they  should be viewed and used as supplementary  and subservient to human clinical judgment Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
  • 7. Appropriate Use of Health IT Standard view  Practitioners have obligation to use tools  responsibly, through adequate training &  understanding the system’s abilities &  limitations  Practitioners must not ignore their clinical  judgment reflexively when using CDS. Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
  • 8. Appropriate Use of Health IT  Health IT “should be used in clinical practice  only after appropriate evaluation of its efficacy  and the documentation that it performs its  intended task at an acceptable cost in time &  money”  Qualified (licensed, trained & experienced)  health professionals as users  Systems should be used to  augment/supplement, rather than replace or  supplant individuals’ decision making  Adequate training Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
  • 9. Ethics for Developers  Follow standard of care & scientific progress  (evidence‐based)  System evaluation is ethically imperative Goodman & Miller. Chapter 10: Ethics and Health Informatics: Users, Standards, and Outcomes. In Shortliffe (3rd Edition).
  • 10. Privacy & Security  Privacy: “The ability of an individual or group  to seclude themselves or information about  themselves and thereby reveal themselves  selectively.” (Wikipedia)  Security: “The degree of protection to safeguard  ... person against danger, damage, loss, and  crime.” (Wikipedia)  Information Security: “Protecting information  and information systems from unauthorized  access, use, disclosure, disruption, modification,  perusal, inspection, recording or destruction”  (Wikipedia)
  • 11. Information Security  Confidentiality  Integrity  Availability
  • 12. Security Safeguards  Physical Security  System Security  Antivirus, Firewall, Intrusion Detection/Prevention  System, Log files, Monitoring  Software Security  Network Security  Database Security  User Security  User account management  Education against phishing/social engineering  Encryption
  • 13. Social Engineering Examples Dear mail.mahidol.ac.th Email Account User, We wrote to you on 11th January 2010 advising that you change the password on your account in order to prevent any unauthorised account access following the network instruction we previously communicated. all Mailhub systems will undergo regularly scheduled maintenance. Access to your e‐mail via the Webmail client will be unavailable for some time during this maintenance period. We are currently upgrading our data base and e‐mail account center i.e homepage view. We shall be deleting old [https://mail.mahidol.ac.th/l accounts which are no longer active to create more space for new accountsusers. we have also investigated a system wide security audit to improve and enhance our current security. In order to continue using our services you are require to update and re‐comfirmed your email account details as requested below. To complete your account re‐comfirmation,you must reply to this email immediately and enter your account details as requested below. Username : Password : Date of Birth: Future Password : Real social‐engineering e‐mail received by Speaker
  • 15. Privacy Safeguards  Security safeguards  Informed consent  Privacy culture  User awareness building & education  Organizational policy & regulations  Enforcement  Ongoing privacy & security assessments, monitoring,  and protection Image: http://www.nurseweek.com/news/images/privacy.jpg
  • 16. Other Security Concepts & Techniques  Authentication & Authorization  Role‐based access control  Two‐factor authentication  Audit trails HIPAA  Personal Health Information (PHI)  Any individually identifiable health information about a  patient that is created, received, processed, or stored by a  health plan, clearinghouse, or provider  Deidentified
  • 17. HIPAA (U.S.)  Health Insurance Portability and Accountability Act of 1996  More stringent state privacy laws apply  HIPAA Privacy Rule  Regulates use & disclosure of protected health information held by  covered entities  Covered Entities: Health plans, providers, clearing houses, and their  business associates  Protected Health Information (PHI): Any individually identifiable  health information about a patient  HIPAA Security Rule  Lays out security safeguards required for compliance  Administrative safeguards, Physical safeguards, Technical safeguards  New in HITECH Act of 2009  Breach notification
  • 18. Protected Health Information – Personal Identifiers in PHI  Name  Account No.  Address  Certificate/License No.  Phone number  Device ID No.  Fax number  Vehicle ID No.  E‐mail address  Drivers license No.  SSN  URL  Birthdate  IP Address  Medical Record No.  Biometric identifier   Health Plan ID including fingerprints  Treatment date   Full face photo From a slide by David S. Pieczkiewicz for a Health Informatics II class (2006) at the University of Minnesota
  • 19. Under HIPAA Privacy Rule  Some permitted uses and disclosures  Treatment, payment, health care operations  Quality improvement  Competency assurance  Medical reviews & audits  Insurance functions  Business planning & administration  General administrative activities
  • 20. Health Information Privacy Law:  U.S. Challenges  Conflicts between federal vs. state laws  Variations among state laws of different  states  HIPAA only covers “covered entities”  No general privacy laws in place, only a few  sectoral privacy laws e.g. HIPAA
  • 21. Health Information Privacy Law:  Other Western Countries  Canada ‐ The Privacy Act (1983), Personal  Information Protection and Electronic Data  Act of 2000  EU Countries ‐ EU Data Protection Directive  UK ‐ Data Protection Act 1998  Austria ‐ Data Protection Act 2000  Australia ‐ Privacy Act of 1988  Germany ‐ Federal Data Protection Act of  2001
  • 22. Hippocratic Oath ... What I may see or hear in the course of  treatment or even outside of the  treatment in regard to the life of men,  which on no account one must spread  abroad, I will keep myself holding such  things shameful to be spoken about. ... http://en.wikipedia.org/wiki/Hippocratic_Oath
  • 23. Thai ICT Laws  Copyright Act, B.E. 2537  พรบ.ลิขสิทธิ ์ พ.ศ. 2537  And other IP laws (e.g. Patent Act)  Important for intellectual property  considerations (e.g. who owns the  software source code of an in‐house  or outsourced system?) Not considered professional legal opinion
  • 24. Thai ICT Laws  Computer‐Related Crimes Act, B.E. 2550  พรบ.การกระทําความผิดเกียวกับคอมพิวเตอร์ พ.ศ. 2550 ่  Focuses on prosecuting computer  crimes & computer‐related crimes  Responsibility of organizations as IT  service provider: Logging &  provision of access data to authorities Not considered professional legal opinion
  • 25. Thai ICT Laws  Electronic Transactions Acts, B.E. 2544 & 2551  พรบ.ว่าด้วยธุรกรรมทางอิเล็กทรอนิกส์ พ.ศ. 2544 และ พรบ.ว่าด้วยธุรกรรม ทางอิเล็กทรอนิกส์ (ฉบับที่ 2) พ.ศ. 2551  Legal binding of electronic transactions and  electronic signatures  Security & privacy requirements for  Determining legal validity & integrity of  electronic transactions and documents, print‐ outs, & paper‐to‐electronic conversions  Governmental & public organizations  Critical infrastructures  Financial sectors  Electronic certificate authorities Not considered professional legal opinion
  • 26. Thai Privacy Laws  No universal personal data privacy law  (Draft law has been proposed)  National Health Act, B.E. 2550  พรบ.สุขภาพแห่งชาติ พ.ศ. 2550  “มาตรา 7 ข้อมูลด้านสุขภาพของบุคคล เป็ นความลับส่วนบุคคล ผูใดจะนําไปเปิดเผยในประการทีน่าจะทําให้บุคคลนันเสียหายไม่ได้ ้ ่ ้ เว้นแต่การเปิดเผยนันเป็ นไปตามความประสงค์ของบุคคลนัน ้ ้ โดยตรง หรือมีกฎหมายเฉพาะบัญญัตให้ตองเปิดเผย แต่ไม่วาใน ิ ้ ่ กรณีใด ๆ ผูใดจะอาศัยอํานาจหรือสิทธิตามกฎหมายว่าด้วยข้อมูล ้ ข่าวสารของราชการหรือกฎหมายอืนเพือขอเอกสารเกียวกับข้อมูล ่ ่ ่ ด้านสุขภาพของบุคคลทีไม่ใช่ของตนไม่ได้” ่ Not considered professional legal opinion
  • 27. Thai Privacy Laws  The Sanatorium Acts, B.E. 2541 &  2547  พรบ.สถานพยาบาล พ.ศ. 2541 และ พรบ.สถานพยาบาล (ฉบับที่ 2) พ.ศ. 2547  ประกาศกระทรวงสาธารณสุข ฉบับที่ 3 (พ.ศ. 2542) เรือง ่ ชนิดหรือประเภทของการรักษาพยาบาล การบริการอื่นของ ้ ่ ่ ้ั สถานพยาบาลและสิทธิของผูปวยซึงผูรบอนุญาตจะต้องแสดง ตามมาตรา 32 (3) Not considered professional legal opinion
  • 28. Thai Privacy Laws คําประกาศสิทธิของผูป่วย ้ “... ้ ่ 7. ผูปวยมีสทธิทจะได้รบการปกปิดข้อมูลเกียวกับตนเอง จากผู้ ิ ่ี ั ่ ประกอบวิชาชีพโดยเคร่งครัด เว้นแต่จะได้รบความยินยอมจากผูปวย ั ้ ่ หรือการปฏิบตหน้าทีตามกฎหมาย ั ิ ่ ... ้ ่ 9. ผูปวยมีสทธิทจะได้รบทราบข้อมูลเกียวกับรักษาพยาบาลเฉพาะ ิ ่ี ั ่ ของตนทีปรากฏในเวชระเบียนเมือร้องขอ ทังนี้ ข้อมูลดังกล่าวต้องไม่ ่ ่ ้ เป็ นการละเมิดสิทธิสวนตัวของบุคคลอืน ่ ่ ...” Not considered professional legal opinion
  • 29. Thai Privacy Laws  The Official Information Act, B.E. 2540  พรบ.ข้อมูลข่าวสารของราชการ พ.ศ. 2540  “เปิ ดเผยเป็ นหลัก ปกปิ ดเป็ นข้อยกเว้น” “มาตรา 15 ข้อมูลข่าวสารของราชการทีมลกษณะอย่างหนึ่งอย่างใดดังต่อไปนี้ ่ ีั หน่วยงานของรัฐหรือเจ้าหน้าทีของรัฐอาจมีคาสังมิให้เปิดเผยก็ได้ โดยคํานึงถึง ่ ํ ่ การปฏิบตหน้าทีตามกฎหมาย...ประกอบกัน ั ิ ่ ... (5) รายงานการแพทย์หรือข้อมูลข่าวสารส่วนบุคคลซึงการเปิดเผยจะเป็ นการรุก ่ ลํ้าสิทธิสวนบุคคลโดยไม่สมควร ่ (6) ข้อมูลข่าวสารของราชการทีมกฎหมายคุมครองมิให้เปิดเผย... ่ ี ้ ...” Not considered professional legal opinion
  • 30. Health Information Privacy Law:  Thailand’s Challenges  Official Information Act only covers  governmental organizations  “Disclose as a rule, protect as an exception”  not appropriate mindset for health  information  National Health Act: One blanket provision  with minimal exceptions: raising concerns  about enforceability (in exceptional  circumstances, e.g. disasters) Not considered professional legal opinion
  • 31. Health Information Privacy Law:  Thailand’s Challenges  No general data privacy law in place  Unclear implications from ICT laws (e.g.  Electronic Transactions Act)  Governance: No governmental authority  responsible for oversight, enforcement &  regulation of health information privacy  protections  Policy: No systematic national policy to  promote privacy protections Not considered professional legal opinion
  • 32. We Need A Better Information  Privacy Law That Takes Into  Account the Unique Nature of  Health Information and the  Various Use Cases &  Contingencies in Use & Disclosure  of Health Information in  Thailand’s Context Nawanan Theera‐Ampornpunt Not considered professional legal opinion
  • 33. Privacy: The Cultural Aspect From Flickr by Bikoy (Victor Villanueva)
  • 34. Privacy: The Cultural Aspect From Flickr by Saikofish
  • 35. Extra  Can the electronic data in EHRs be used in  court or for other legal purposes? If so, to  what extent and under what legal  provisions?  I wrote a personal opinion on this in March  2012. Not a professional legal opinion and  only based on Ramathibodi’s context, but  would be happy to share. Not considered professional legal opinion