SlideShare a Scribd company logo
1 of 34
Legal and Ethical
Considerations in Nursing
Informatics
Information Security and
OBJECTIVESOBJECTIVES
1. Differentiate between privacy, confidentiality,
information privacy, and information security.
2. Discuss how information system security
affects privacy, confidentiality, and security.
3. Identify potential threats to system security
and information.
OBJECTIVESOBJECTIVES
4. Discuss security measures designed to protect
information.
5. Compare and contrast available methods of
authentication in terms of levels of security,
costs, and ease of use.
6. Distinguish between appropriate and
inappropriate password selection and
processing.
OBJECTIVESOBJECTIVES
7. Identify common examples of confidential
forms and communication seen in healthcare
settings and identify proper disposal
techniques for each.
8. Discuss the impact that Internet technology
has on the security of health-related
information.
Outlines:Outlines:
1. Key concepts: privacy, confidentiality,
information privacy, and information security.
2. The effect of information system security on:
privacy, confidentiality, and security.
3. potential threats to system security and
information.
OutlinesOutlines::
4. Security measures designed to protect
information.
5. The available methods of authentication in
terms of levels of security, costs, and ease of
use.
6. Appropriate and inappropriate password
selection and processing.
OutlinesOutlines::
7. common examples of confidential forms and
communication seen in healthcare settings
and proper disposal techniques for each.
8. The impact that Internet technology has on
the security of health-related information.
Information SecurityInformation Security
 the protection of information
against threats to its integrity,
inadvertent disclosure, or
availability determines the
survivability of a system
What is Confidentiality?
 “The ethical principle or legal right that a
physician or other health professional will hold
secret all information relating to a patient,
unless the patient gives consent permitting
disclosure”(American Heritage Medical
Dictionary, 2007).
 “The nondisclosure of information except to
another authorized person” (Mosby, 2009).
Confidentiality Breach
 A breach of confidentiality is a disclosure of private
information to a third party not involved with the
patient’s care, without patient consent orcourt
order. Disclosure can be oral orwritten, by telephone
orfax, orelectronically, forexample, via e-mail or
health information networks (AMA, 2012).
 Accessing the medical records of patient’s without
legitimate reason is also considered a breach of
confidentiality (Fox, 2008).
Consent:
is an agreement, approval, or permission
given voluntarily by a competent
person that permits some act(s) for some
stated purpose(s)
For example,
a patient may consent to having their
personal health information collected
by a clinic or consent to its disclosure to a
third party (e.g., an insurance provider).
Anonymity
allows the subjects in a database
to remain nameless and
unidentified.
Pseudonymity
allows the subjects in a database to be
tracked over time while at the same time
remaining nameless. Pseudonyms (e.g.,
patient X, patient Y, etc.) are attached to
records instead of names, addresses and
other public identifiers.
Steps to SecuritySteps to Security
 Assessment of risks and assets
 An organizational plan
 A “culture” of security
 The establishment and enforcement of policies
Threats to System SecurityThreats to System Security
and Informationand Information
 Thieves
 Hackers and
crackers
 Denial of service
attacks
 Terrorists
 Viruses, worms
 Flooding sites
 Power
fluctuations
 Revenge attacks
Threats to System SecurityThreats to System Security
and Informationand Information
 Pirated Web sites
 Poor password
management
 Compromised
device
 Fires and natural
disasters
 Human error
 Unauthorized
insider access
Security MeasuresSecurity Measures
• Firewalls
– barrier created from software and hardware
• Antivirus and spyware detection
• User sign-on and passwords or other means of
identity management
• Access on a need-to-know basis- level of access
• Automatic sign-off
• Physical restrictions to system access
PasswordPassword
 Collection of alphanumeric characters that the
user types into the computer
 May be required after the entry of an access
code or user name
 Assigned after successful system training
 Inexpensive but not the most effective means
of verification
Password Selection andPassword Selection and
HandlingHandling
 Do:
 Choose passwords that
are 8-12 characters
long.
 Avoid obvious
passwords.
 Keep your password
private- ie, do not
share.
 Change password
frequently.
 Do not:
 Post or write down
passwords.
 Leave computers or
applications running
when not in use.
 Re-use the same
password for different
systems.
 Use the “browser save”
feature.
BiometricsBiometrics
 Identification based on a unique biological trait,
such as:
 a fingerprint
 voice or iris pattern
 retinal scan
 hand geometry
 face recognition
 ear pattern
 smell
 blood vessels in the palm
 gait recognition
Antivirus SoftwareAntivirus Software
 Computer programs that can locate and
eradicate viruses and other malicious programs
from scanned memory sticks, storage devices,
individual computers, and networks
Spyware Detection SoftwareSpyware Detection Software
 Spyware
 a type of software that installs itself without
the user’s permission, collects passwords,
PIN numbers, and account numbers and
sends them to another party
 Spyware Detection Software
 Detects and eliminates spyware
The Impact of the InternetThe Impact of the Internet
 Introduces new threats
 E-mail and instant messages may carry personal
health information that can be intercepted
 Unapproved use of messages or Web sites can
introduce malicious programs
 Web sites used for personal health information
may be inappropriately accessed
Implications for Mobile ComputingImplications for Mobile Computing
 Devices are easily stolen.
 Devices should require authentication and
encryption to safeguard information security.
 Devices should never be left where information
may be seen by unauthorized viewers.
 Verify wireless networks before use.
 Responsibility for information and
information system security is shared
The ten security principles
1. Accountability for information :
Organizations that collect, use or disclose
PHI are responsible for the personal health
information in their custody or care.
A named individual within the organization
should be responsible for facilitating
organizational compliance with applicable
data protection legislation and
organizational privacy policies.
2. Identifying purposes for collection , use
and disclosure of information :
To allow patients to make appropriate decisions
about their PHI, it is important that they be made
aware of the purposes for which this information
is being collected, used, and disclosed.
There are many legitimate purposes for collecting
personal health information; indeed, an
international standard classification of such
purposes has been developed
These purposes include:
• providing clinical care to an individual
• providing emergency care to an individual
• supporting care activities for the individual within the
healthcare organization.
• enabling medical billing (and/or permissions from a
funding party for providing health care services to the
patient )
• health service management and quality assurance
• education for health care professionals
• public health surveillance and disease control
3. Consent :
An organisation should be able to
demonstrate that it is in compliance with
applicable laws and that the patient can
reasonably be expected to know that
information about them was going to be
collected and used for defined purposes.
4. Limiting collection :
Organisations should limit collection of
personal health information to that which is
necessary for the identified purposes; i.e.
personal health information should not be
collected indiscriminately
Historically, many fields of data (e.g.,
religion and race) were collected in patient
records, even in cases where they had little
or no bearing on treatment and care.
5. Limiting use , disclosure and
retention :
Once organisations identify the purposes
for which they collect personal and seek
consent
6. Accuracy : The need for accuracy as a
fair information practice is particularly
relevant in the delivery of healthcare.
7. Safeguards : By implementing
information security safeguards,
organisations protect personal health
information against loss and theft, as well
as unauthorized access, disclosure,
copying, use, and modification.
8. Openness : It should be possible for
concerned patients to know the purposes
for which information about them is
collected, used, and disclosed.
9. Individual access :
Patients should have the right to access their
own personal health information so that they can
assure its accuracy, and amend inaccurate or
incomplete information
10. Challenging compliance :
The right of a patient to lodge a privacy
complaint against an organization was fi rst
articulated when the Fair Information Practices
were promulgated more than 40 years ago
Reference
Hebda, T. & Czar, P. (2013). Handbook of
informatics for nurses and health care
professionals (5th
 ed.). Upper Saddle River,
New Jersey: Pearson. 

More Related Content

What's hot

Nursing informatics presentation
Nursing informatics presentationNursing informatics presentation
Nursing informatics presentationLeeann Sills
 
Nursing technology informatics presentation
Nursing technology informatics presentationNursing technology informatics presentation
Nursing technology informatics presentationLeeann Sills
 
Application of nursing informatics
Application of nursing informaticsApplication of nursing informatics
Application of nursing informaticsJoannie Rose Pelien
 
information technology in nursing
information technology in nursinginformation technology in nursing
information technology in nursingpoorny purushoth
 
The Internet (Nursing Informatics)
The Internet (Nursing Informatics)The Internet (Nursing Informatics)
The Internet (Nursing Informatics)Rendell Apalin
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityJaimika Patel
 
Nursing ethics
Nursing ethics Nursing ethics
Nursing ethics Maputi24
 
Ethical and legal issues in nursing
Ethical and legal issues in nursingEthical and legal issues in nursing
Ethical and legal issues in nursingJays George
 
The ICN Code of Ethics for Nurses
The ICN Code of Ethics for NursesThe ICN Code of Ethics for Nurses
The ICN Code of Ethics for NursesProf Vijayraddi
 

What's hot (20)

Nursing informatics presentation
Nursing informatics presentationNursing informatics presentation
Nursing informatics presentation
 
Nursing technology informatics presentation
Nursing technology informatics presentationNursing technology informatics presentation
Nursing technology informatics presentation
 
Application of nursing informatics
Application of nursing informaticsApplication of nursing informatics
Application of nursing informatics
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
Legal & ethical issues in nursing- issues in india
Legal & ethical issues in nursing-  issues in indiaLegal & ethical issues in nursing-  issues in india
Legal & ethical issues in nursing- issues in india
 
Health care information system
Health care information systemHealth care information system
Health care information system
 
Ethical & Social Issues in Health IT
Ethical & Social Issues in Health ITEthical & Social Issues in Health IT
Ethical & Social Issues in Health IT
 
information technology in nursing
information technology in nursinginformation technology in nursing
information technology in nursing
 
Nursing Ethics
Nursing EthicsNursing Ethics
Nursing Ethics
 
The Internet (Nursing Informatics)
The Internet (Nursing Informatics)The Internet (Nursing Informatics)
The Internet (Nursing Informatics)
 
Nursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and securityNursing informatics and healthcare policy, privacy confidentiality and security
Nursing informatics and healthcare policy, privacy confidentiality and security
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
Health informatics
Health  informatics Health  informatics
Health informatics
 
Informatics & Technology in Nursing
Informatics & Technology in NursingInformatics & Technology in Nursing
Informatics & Technology in Nursing
 
Nursing ethics
Nursing ethics Nursing ethics
Nursing ethics
 
Ethical and legal issues in nursing
Ethical and legal issues in nursingEthical and legal issues in nursing
Ethical and legal issues in nursing
 
Hospital information system for Nurses
Hospital information system for NursesHospital information system for Nurses
Hospital information system for Nurses
 
Health Informatics and Patient Safety
Health Informatics and Patient SafetyHealth Informatics and Patient Safety
Health Informatics and Patient Safety
 
The ICN Code of Ethics for Nurses
The ICN Code of Ethics for NursesThe ICN Code of Ethics for Nurses
The ICN Code of Ethics for Nurses
 
Collabration in nursing ppt
Collabration  in nursing pptCollabration  in nursing ppt
Collabration in nursing ppt
 

Similar to Legal and Ethical Considerations in Nursing Informatics: Information Security

Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareLajpat Rai
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act Kartheek Kein
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextNawanan Theera-Ampornpunt
 
Ann Cavoukian Presentation
Ann Cavoukian PresentationAnn Cavoukian Presentation
Ann Cavoukian PresentationCityAge
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docxsheronlewthwaite
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1SNikki
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsMEASURE Evaluation
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityLucy Lacy
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityLucy Lacy
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalLucy Lacy
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docxteresehearn
 
Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareVaileth Mdete
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Securing health information
Securing health informationSecuring health information
Securing health informationDarla Moore
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 

Similar to Legal and Ethical Considerations in Nursing Informatics: Information Security (20)

Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health Care
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act 
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's Context
 
Ann Cavoukian Presentation
Ann Cavoukian PresentationAnn Cavoukian Presentation
Ann Cavoukian Presentation
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
 
Data security training
Data security trainingData security training
Data security training
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality final
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health Care
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Securing health information
Securing health informationSecuring health information
Securing health information
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
HIPAA
HIPAAHIPAA
HIPAA
 

More from AHMED ZINHOM

Technological changes and cost
Technological changes and costTechnological changes and cost
Technological changes and costAHMED ZINHOM
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systemsAHMED ZINHOM
 
Cost effectiveness and cost efficiency
Cost effectiveness and cost efficiencyCost effectiveness and cost efficiency
Cost effectiveness and cost efficiencyAHMED ZINHOM
 
Absenteeism and turn over
Absenteeism and turn overAbsenteeism and turn over
Absenteeism and turn overAHMED ZINHOM
 
patient classification system,staffing
patient classification system,staffingpatient classification system,staffing
patient classification system,staffingAHMED ZINHOM
 
Group decision making
Group decision makingGroup decision making
Group decision makingAHMED ZINHOM
 
Types of staff development
Types of staff developmentTypes of staff development
Types of staff developmentAHMED ZINHOM
 
Recruitment&selection of nursing personnel
Recruitment&selection of nursing personnelRecruitment&selection of nursing personnel
Recruitment&selection of nursing personnelAHMED ZINHOM
 

More from AHMED ZINHOM (11)

Technological changes and cost
Technological changes and costTechnological changes and cost
Technological changes and cost
 
Clinical decision support systems
Clinical decision support systemsClinical decision support systems
Clinical decision support systems
 
Cost effectiveness and cost efficiency
Cost effectiveness and cost efficiencyCost effectiveness and cost efficiency
Cost effectiveness and cost efficiency
 
Absenteeism and turn over
Absenteeism and turn overAbsenteeism and turn over
Absenteeism and turn over
 
Time management
Time managementTime management
Time management
 
Shared governance
Shared governanceShared governance
Shared governance
 
patient classification system,staffing
patient classification system,staffingpatient classification system,staffing
patient classification system,staffing
 
Group decision making
Group decision makingGroup decision making
Group decision making
 
Types of staff development
Types of staff developmentTypes of staff development
Types of staff development
 
Recruitment&selection of nursing personnel
Recruitment&selection of nursing personnelRecruitment&selection of nursing personnel
Recruitment&selection of nursing personnel
 
Accreditation
AccreditationAccreditation
Accreditation
 

Recently uploaded

VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service DehradunDehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service DehradunNiamh verma
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...Call Girls Noida
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Miss joya
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591adityaroy0215
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhVip call girls In Chandigarh
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
 
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...Gfnyt.com
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Call Girls Noida
 
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...Gfnyt
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabadgragmanisha42
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girls Service Chandigarh Ayushi
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...chandigarhentertainm
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Call Girls Service Chandigarh Ayushi
 

Recently uploaded (20)

VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service DehradunDehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
 
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
 

Legal and Ethical Considerations in Nursing Informatics: Information Security

  • 1. Legal and Ethical Considerations in Nursing Informatics Information Security and
  • 2. OBJECTIVESOBJECTIVES 1. Differentiate between privacy, confidentiality, information privacy, and information security. 2. Discuss how information system security affects privacy, confidentiality, and security. 3. Identify potential threats to system security and information.
  • 3. OBJECTIVESOBJECTIVES 4. Discuss security measures designed to protect information. 5. Compare and contrast available methods of authentication in terms of levels of security, costs, and ease of use. 6. Distinguish between appropriate and inappropriate password selection and processing.
  • 4. OBJECTIVESOBJECTIVES 7. Identify common examples of confidential forms and communication seen in healthcare settings and identify proper disposal techniques for each. 8. Discuss the impact that Internet technology has on the security of health-related information.
  • 5. Outlines:Outlines: 1. Key concepts: privacy, confidentiality, information privacy, and information security. 2. The effect of information system security on: privacy, confidentiality, and security. 3. potential threats to system security and information.
  • 6. OutlinesOutlines:: 4. Security measures designed to protect information. 5. The available methods of authentication in terms of levels of security, costs, and ease of use. 6. Appropriate and inappropriate password selection and processing.
  • 7. OutlinesOutlines:: 7. common examples of confidential forms and communication seen in healthcare settings and proper disposal techniques for each. 8. The impact that Internet technology has on the security of health-related information.
  • 8. Information SecurityInformation Security  the protection of information against threats to its integrity, inadvertent disclosure, or availability determines the survivability of a system
  • 9. What is Confidentiality?  “The ethical principle or legal right that a physician or other health professional will hold secret all information relating to a patient, unless the patient gives consent permitting disclosure”(American Heritage Medical Dictionary, 2007).  “The nondisclosure of information except to another authorized person” (Mosby, 2009).
  • 10. Confidentiality Breach  A breach of confidentiality is a disclosure of private information to a third party not involved with the patient’s care, without patient consent orcourt order. Disclosure can be oral orwritten, by telephone orfax, orelectronically, forexample, via e-mail or health information networks (AMA, 2012).  Accessing the medical records of patient’s without legitimate reason is also considered a breach of confidentiality (Fox, 2008).
  • 11. Consent: is an agreement, approval, or permission given voluntarily by a competent person that permits some act(s) for some stated purpose(s) For example, a patient may consent to having their personal health information collected by a clinic or consent to its disclosure to a third party (e.g., an insurance provider).
  • 12. Anonymity allows the subjects in a database to remain nameless and unidentified.
  • 13. Pseudonymity allows the subjects in a database to be tracked over time while at the same time remaining nameless. Pseudonyms (e.g., patient X, patient Y, etc.) are attached to records instead of names, addresses and other public identifiers.
  • 14. Steps to SecuritySteps to Security  Assessment of risks and assets  An organizational plan  A “culture” of security  The establishment and enforcement of policies
  • 15. Threats to System SecurityThreats to System Security and Informationand Information  Thieves  Hackers and crackers  Denial of service attacks  Terrorists  Viruses, worms  Flooding sites  Power fluctuations  Revenge attacks
  • 16. Threats to System SecurityThreats to System Security and Informationand Information  Pirated Web sites  Poor password management  Compromised device  Fires and natural disasters  Human error  Unauthorized insider access
  • 17. Security MeasuresSecurity Measures • Firewalls – barrier created from software and hardware • Antivirus and spyware detection • User sign-on and passwords or other means of identity management • Access on a need-to-know basis- level of access • Automatic sign-off • Physical restrictions to system access
  • 18. PasswordPassword  Collection of alphanumeric characters that the user types into the computer  May be required after the entry of an access code or user name  Assigned after successful system training  Inexpensive but not the most effective means of verification
  • 19. Password Selection andPassword Selection and HandlingHandling  Do:  Choose passwords that are 8-12 characters long.  Avoid obvious passwords.  Keep your password private- ie, do not share.  Change password frequently.  Do not:  Post or write down passwords.  Leave computers or applications running when not in use.  Re-use the same password for different systems.  Use the “browser save” feature.
  • 20. BiometricsBiometrics  Identification based on a unique biological trait, such as:  a fingerprint  voice or iris pattern  retinal scan  hand geometry  face recognition  ear pattern  smell  blood vessels in the palm  gait recognition
  • 21. Antivirus SoftwareAntivirus Software  Computer programs that can locate and eradicate viruses and other malicious programs from scanned memory sticks, storage devices, individual computers, and networks
  • 22. Spyware Detection SoftwareSpyware Detection Software  Spyware  a type of software that installs itself without the user’s permission, collects passwords, PIN numbers, and account numbers and sends them to another party  Spyware Detection Software  Detects and eliminates spyware
  • 23. The Impact of the InternetThe Impact of the Internet  Introduces new threats  E-mail and instant messages may carry personal health information that can be intercepted  Unapproved use of messages or Web sites can introduce malicious programs  Web sites used for personal health information may be inappropriately accessed
  • 24. Implications for Mobile ComputingImplications for Mobile Computing  Devices are easily stolen.  Devices should require authentication and encryption to safeguard information security.  Devices should never be left where information may be seen by unauthorized viewers.
  • 25.  Verify wireless networks before use.  Responsibility for information and information system security is shared
  • 26. The ten security principles 1. Accountability for information : Organizations that collect, use or disclose PHI are responsible for the personal health information in their custody or care. A named individual within the organization should be responsible for facilitating organizational compliance with applicable data protection legislation and organizational privacy policies.
  • 27. 2. Identifying purposes for collection , use and disclosure of information : To allow patients to make appropriate decisions about their PHI, it is important that they be made aware of the purposes for which this information is being collected, used, and disclosed. There are many legitimate purposes for collecting personal health information; indeed, an international standard classification of such purposes has been developed
  • 28. These purposes include: • providing clinical care to an individual • providing emergency care to an individual • supporting care activities for the individual within the healthcare organization. • enabling medical billing (and/or permissions from a funding party for providing health care services to the patient ) • health service management and quality assurance • education for health care professionals • public health surveillance and disease control
  • 29. 3. Consent : An organisation should be able to demonstrate that it is in compliance with applicable laws and that the patient can reasonably be expected to know that information about them was going to be collected and used for defined purposes.
  • 30. 4. Limiting collection : Organisations should limit collection of personal health information to that which is necessary for the identified purposes; i.e. personal health information should not be collected indiscriminately Historically, many fields of data (e.g., religion and race) were collected in patient records, even in cases where they had little or no bearing on treatment and care.
  • 31. 5. Limiting use , disclosure and retention : Once organisations identify the purposes for which they collect personal and seek consent 6. Accuracy : The need for accuracy as a fair information practice is particularly relevant in the delivery of healthcare.
  • 32. 7. Safeguards : By implementing information security safeguards, organisations protect personal health information against loss and theft, as well as unauthorized access, disclosure, copying, use, and modification. 8. Openness : It should be possible for concerned patients to know the purposes for which information about them is collected, used, and disclosed.
  • 33. 9. Individual access : Patients should have the right to access their own personal health information so that they can assure its accuracy, and amend inaccurate or incomplete information 10. Challenging compliance : The right of a patient to lodge a privacy complaint against an organization was fi rst articulated when the Fair Information Practices were promulgated more than 40 years ago
  • 34. Reference Hebda, T. & Czar, P. (2013). Handbook of informatics for nurses and health care professionals (5th  ed.). Upper Saddle River, New Jersey: Pearson. 

Editor's Notes

  1. inadvertent غير مقصود
  2. Revenge الانتقام
  3. Pirated المقرصنة
  4. Iris قزحية العين
  5. instant الفورية