Ethics, Privacy, and Security
Ethics, Privacy, and Security
Ethics, Privacy, and Security
a. A computer program should be used in clinical practice only after appropriate evaluation of
its efficacy and the documentation that it performs its intended task at an acceptable cost
in time and money.
b. All uses of informatics tools, especially in patient care, should be preceded by adequate
training and instruction, which should include review of applicable product evaluations.
c. Users of most clinical systems should be health professionals who are qualified to address
the question at hand on the basis of their licensure, clinical training, and experience.
Software systems should be used to augment or supplement, rather than to replace or
supplant, such invididual’s decision making.Â
All persons and group of persons have a fundamental right to privacy, and hence to
control over the collection, storage, access, use, communication, manipulation, linkage
and disposition of data about themselves.
2. Principle of Openness
3. Principle of Security
Data that have been legitimately collected about persons or groups of persons should be
protected by all reasonable and appropriate measures against loss degradation,
unauthorized destruction, access, use, manipulation, linkage, modification or
communication.
4. Principle of Access
The subjects of electronic health records have the right of access to those records and
the right to correct them with respect to its accurateness, completeness and relevance.
The fundamental right of privacy and of control over the collection, storage, access, use,
manipulation, linkage, communication and disposition of personal data is conditioned
only by the legitimate, appropriate and relevant data-needs of a free, responsible and
democratic society, and by the equal and competing rights of others.
Any infringement of the privacy rights of a person or group of persons, and of their right
of control over data about them, may only occur in the least intrusive fashion and with a
minimum of interference with the rights of the affected parties.
7. Principle of Accountability
Any infringement of the privacy rights of a person or group of persons, and of the right to
control over data about them, must be justified to the latter in good time and in an
appropriate fashion.
The National Research Council (1997) emphasizes that technological security tools are essential
components of modern distributed health care information systems, and that they serve five key
functions:
1. Availability—ensuring that accurate and up-to-date information is available when
needed at appropriate places;
2. Accountability—helping to ensure that health care providers are responsible for their
access to and use of information, based on a legitimate need and right to know;
3. Perimeter identification—knowing and controlling the boundaries of trusted access to
the information system, both physically and logically;
4. Controlling access—enabling access for health care providers only to information
essential to the performance of their jobs and limiting the real or perceived temptation
to access information beyond a legitimate need; and
5. Comprehensibility and control—ensuring that record owners, data stewards, and
patients understand and have effective control over appropriate aspects of information
privacy and access.
1. Transparency;
2. Legitimacy of purpose; and
3. Proportionality.
4. Comprehensibility and control—ensuring that record owners, data stewards, and
patients understand and have effective control over appropriate aspects of information
privacy and access.
Consent is one of the major elements highly-valued by the Data Privacy Act. The act provides
that consent must be documented and given prior to the collection of all forms of personal data,
and the collection must be declared, specified, and for a legitimate purpose.
Furthermore, the subject must be notified about the purpose and extent of data processing, with
details specifying the need for automated processing, profiling, direct marketing, or sharing.
These factors ensure that consent is freely-given, specific, and informed.
However, an exception to the requirement of consent is allowed in cases of contractual
agreements where processing is essential to pursue the legitimate interests of the parties,
except when overridden by fundamental rights and freedom. Such is also the case in responding
to national emergencies.
Processing of sensitive and personal information is also forbidden, except in particular
circumstances enumerated below. The Data Privacy Act describes sensitive personal information
as those being:
About an individual's race, ethnic origin, marital status, age, color, and religious,
philosophical or political affiliations;
About an individual's health, education, genetic or sexual life of a person, or to any
proceeding or any offense committed or alleged to have committed;
Issued by government agencies "peculiar" (unique) to an individual, such as social
security number;
Marked as classified by executive order or act of Congress.
Unauthorized processing
Processing for unauthorized purposes
Negligent access
Improper disposal
Unauthorized access or intentional breach
Concealment of breach involving sensitive personal information
Unauthorized disclosure; and
Malicious disclosure.
Any combination or series of acts enumerated above shall make the person subject to
imprisonment ranging from three (3) years to six (6) years, and a fine of not less than One million
pesos (Php1,000,000.00) but not more than Five million pesos (Php5,000,000.00) (Republic Act.
No. 10173, Ch. 8, Sec. 33).