Lesson 14: Ethics, Privacy and Security: Ethics in Health Informatics
Lesson 14: Ethics, Privacy and Security: Ethics in Health Informatics
Lesson 14: Ethics, Privacy and Security: Ethics in Health Informatics
- Technology helped in the modernization of the health care industry, however, this made practitioners
to be dependent on the use of mechanical aids in providing patient treatment. Conversely, human
values should continue to govern research and the actual practice in health care.
- Health care informatics covers issues on honorable actions and proper and improper behaviors in the
field of health care. However, most health practitioners are not familiar with ethical issues even if
some issues have been controversial.
- Nowadays, privacy and confidentiality are among the popular sources of debate. However, more
important issues such as the use of appropriate informatics tools in clinical settings, determination of
users, system evaluation, system development, and many others need attention. These and other
questions on the various legal and regulatory requirements need to be addressed (Goodman, 2016).
- Listed below is a set of ethical principles for appropriate use of decision-support systems, particularly
in Informatics, as described by Shortlife and Cimino, (2013).
1. A program should undergo appropriate evaluation prior to use in clinical practice. It should
perform efficiently at an acceptable financial and timeframe cost.
2. Adequate training and instruction should be completed before proceeding to the
implementation.
3. A qualified health professional should be assigned to handle concerns regarding uses,
licenses, and other concerns. The software systems’ applications should not replace functions
such as decision making.
GENERAL ETHICS
1. Autonomy
- Is defined as either allowing individuals to make their own decisions in response to a particular societal
context, or as the idea of being free from external influence or control. Electronic Health Records (EHR)
must maintain respect for patient autonomy, and this entails certain restrictions about the access,
content, and ownership of records. A compromise must be reached between levels of patient
autonomy and quality of patient records. When patients are given too much control over their EHRs,
this could defeat the purpose of the use of such document because critical information might be
modified or deleted without the knowledge of the health professionals. Limiting patient access and
control over patient records improves document quality because patients can also verify their own
records (Mercuri, 2010).
2. Beneficence and Non-maleficence
- These two principles are respectively defined as “do good” and “do no harm.” I health informatics,
beneficence relates most significantly with the usage of stored data in the EHR system, and non-
maleficence with how the stored data is protected.
- Deeply integrated EHR systems will contain substantial amounts of raw data, and great potential exists
for the conduct of groundbreaking biomedical and public health researches. These kinds of researches
will be beneficial to both the individual patient and to the entirely of society. With this in mind, new
EHR systems should be developed with the capacity to allow patients to release information from their
EHRs which can be valuable to researchers and scientists. Similarly, the available consolidated data
from clinical data repositories will allow health care professionals to provide the best possible
treatment for their patients, further upholding the principle of beneficence.
- However, the integrated data storage in health informatics is also a breeding ground for varying
threats. Temporary outages, at a minimum, might prevent health care professionals from performing
necessary procedures. At worst, it could even result in significant patient mortality. Total system
failures, however, may cause even greater damage. In order to avoid these instances, all data must
have multiple back-ups for fast and easy recovery. Since medical records contain very sensitive
information about an individual, the highest level of data security possible should also be upheld.
Vulnerabilities in security put patients at a risky position, and might ultimately lead to the violation of
the principles of non-maleficence (Mecuri, 2010).
Informatics Ethics
- Is about the ethical behavior expected from an individual assigned to handle information, as prescribed
by the International Medical Informatics Association (2016). It follows seven principles:
1. Principle of Information-Privacy and Disposition – everyone has the fundamental right to
privacy. Every individual should ensure that he or she has control over the collection, access,
use, communication, manipulation, storage, linkage, and disposition of data about himself or
herself.
2. Principle of Openness – the control measures of particular data should be disclosed to the
concerned individual in an appropriate and timely fashion.
3. Principle of Security – legitimately collected data should be protected through all appropriate
measures against access, use, modification or communication, manipulation, linkage, loss,
degradation, and unauthorized destruction.
4. Principle of Access – authorized individuals should be given access to electronic health records
and also have the right to correct the data with respect to their completeness, accuracy, and
relevance.
5. Principle of Legitimate Infringement – the right to privacy and control over personal data should
be conditioned by the appropriate legitimate, and relevant data-requirement of a democratic
society and by the equal rights of others.
6. Principle of the Least Intrusive Alternative – any infringement of privacy rights should occur in
the least intrusive manner and with the least amount of interference with the rights of the
affected parties.
7. Principle of Accountability – any infringement must be justified to the concerned individuals in a
timely and appropriate fashion.
Software Ethics
- Health informatics ethics relies on the use of the software to store and process information. It follows
that the activities carried out by the developers might affect the end-users. Therefore, software
developers have the ethical duties and responsibilities to the stakeholders (society, institution and
employees, and the profession).
- They should execute all system activities with the best interest of the society in mind. They should
disclose any threats or known defects in the software.
- They should ensure that completed activities serve the best interests of the institution and its
employees. They should be straightforward about their personal limitations and qualifications.
- Finally, they must build products that meet the professional standards which are reached through
testing and detailing unresolved issues. In support of the mentioned responsibilities of software
developers, the management should require ethical approaches in software development (Samuel and
Zaiane, 2014).
Examples
Technical Configure computing equipment to ensure security (e.g., virus checking, firewalls)
Safeguards Use certified applications and technologies that store or exchange electronic health
information
Set up access controls to health IT and electronic health information (e.g.,
authorized computer accounts)
Encrypt the electronic health information
Regular audit of the health IT operations
Have backup capabilities (e.g., regular backups of electronic health information to
another computer file server)
- The National Research Council (1997) emphasizes that technological security tools are essential
components of modern distributed health care information systems, and that they serve five key
functions:
1. Availability – ensuring that accurate and up-to-date information is available when needed at
appropriate places.
2. Accountability – helping to ensure that health care providers are responsible for their access to
and use of information, based on a legitimate need and right to know.
3. Perimeter identification – knowing and controlling the boundaries of trusted access to the
information system, both physically and logically.
4. Controlling access – enabling access for health care providers only to information essential to
the performance of their jobs and limiting the real pr perceived temptation to access
information beyond a legitimate need.
5. Comprehensibility and Control – ensuring that record owners, data stewards, and patients
understand and have effective control over appropriate aspects of information privacy and
access.
- McPherson and Pincus (2017) narrate the following flow of information, in a specific portion of the
Hospital Information System such as the Laboratory Information System.
Steps Description