Chapter 25
home glossary index



Legal and Ethical Informatics

Author Additions to Chapter 25

Applications and Competencies

Websites That Expand on Chapter 25's Knowledge



Go to the top of the page



A page, put out by Stanford University, that lists resources pertaining to fair use and copyright. Contains many excellent resources. Don't neglect the President's statement.

Everything you wanted to know about U.S. copyright, but did not know how to ask.

The full copyright law.

The Difference between Copyright Infringement and Plagiarism—and Why It Matters | Peer to Peer Review


What is a code of ethics. Skip over the Google ads and read the easily understood text.

AMIA (American Medical Informatics Association) task force report entitled "Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients" The report provides clear direction to vendors and system purchasers regarding ethics and HIT.


AMIA's Code of Professional and Ethical Conduct.

Hurdle, John F.; Adams, Samantha; Broke,Jane; Chang, Betty; Embi, Peter J.; Petersen, Carolyn; Terrazas, Enrique & Winkelstein, Peter (2007). A Code of Professional Ethical Conduct for the American Medical Informatics Association. Journal of the American Medical Informatics Association 14(4), 391–393.

IMIA Code of Ethics for Health Information Professionals.

Links to Codes of Ethics for many different technological societies sponsored by the Illinois Institute of Technology.

Dr. Charon Pierson from the University of Texas El Paso has created five, open access video/audio modules on Publication Ethics. Each opens with an example and proceeds from there. The first one is an overview, module two provides information about who is and is not an author, which addresses the problem of authors who just lend their name, but are not really authors including, but not limited to, Bosses, Deans, and Advisors. The third module addresses plagiarism in all its forms. Module four looks at conflicts of interest and the final module provides information about retracted literature. Links to helpful sites are part of the page. Excellent information for students as well as authors or potential authors. CE credit of 2.15 is available for these modules.

Go to the top of the page

Fair Use

Copyright and Fair Use. An excellent resource for any use of copyrighted material including academic and Web sites.

Description of Fair Use including a summary of some cases.

US Copyright Office on Fair Use. No doubt the last word!

Copyright and Fair Use in the UMUC Online or Face-to-Face Classroom

Fair Use. Has links to many aspects of fair use.

Legal Issues

Privacy Rights Clearinghouse. Workplace Privacy, An up-to-date page with information about privacy with electronic communication including the telephone.

Amendments, Corrections, and Deletions in the Electronic Health Record. A complete toolkit from the American Health Information Association.

Go to the top of the page

Legal Issues in Interstate Practice

Glazer, G. (May 4, 1999). Legislative Column: Legislative and Policy Issues Related to Interstate Practice. Online Journal of Issues in Nursing

Gaffney, T. (May 31, 1999). The Regulatory Dilemma Surrounding Interstate Practice Online Journal of Issues in Nursing 4(1). Manuscript 1. Available:

The National Council of State Boards keeps an updated list of states whose legislatures have approved the "Nurse Licensure Compact" which allows a nurse licensed in participating states to practice in another participating state IF the nurse follows the state laws regulating nursing in that state.

Hutcherson, Carolyn M. (September 30, 2001). "Legal Considerations for Nurses Practicing in a Telehealth Setting". Online Journal of Issues in Nursing 6(3). Manuscript 3.


Go to the top of the page

Applications and Competencies

Number 2 - Privacy Rights Clearing House - then search for data breaches.

Number 3 HIPAA - See Chapter 20 and HITECH in Chapter 20

Number 5 - RFID see Chapter 20

Websites from the Text in Chapter 25

(ANA) Code of Ethics for Nurses (2001), available online at

Center for Nursing Advocacy website at

Privacy Rights Clearinghouse (2010) maintains an online record of all types of security breaches at


Copyright tools to assess fair use and information on how copyright applies to education

Taking the Mystery out of Copyright

Google Book Search

Appropriate citation and referencing. (No longer available at this URL)Instead go to

Go to the top of the page


Websites from the Reference List in Chapter 25

Absolute Software. (2010). Built-in protection in laptop PCs improves compliance with new healthcare rules. Retrieved November 3, 2010, from

ATA. (2007, March). Licensure portability. Retrieved November 4, 2010, from (No longer available at this URL)Instead go to

Bonsor, K., & Keener, C. (2007, November 5). How RFID works. Retrieved November 4, 2010, from

Department of Health and Human Services. (2009). Guidance specifying the technologies and methodologies that render protected health information unusable, unreadable, or indecipherable to unauthorized individuals for purposes of the breach notification requirements under Section 13405 of Title XIII (Health Information Technology for Economic and Clinical Health Act of 2009). Retrieved November 3, 2010, from

District Court Rules in Perfect 10 v. Google. (2006, February 17). Tech Law Journal. Retrieved from

Gallup Inc. (2009, November 22). Honest/ethics in professions. Retrieved November 1, 2010, from (No longer available at this URL)Instead go to

Google. (2010a). About Google books. Retrieved November 4, 2010, from

Google. (2010b). Library partners. Retrieved November 4, 2010, from

Google. (2010c). Google books settlement agreement. Retrieved November 4, 2010, from (No longer available at this URL)Instead go to

HIMSS Analytics. (2009, November). 2009 HIMSS Analytics report: Evaluating HITECH’s impact on healthcare privacy and security. Retrieved November 3, 2010, from

Identify Theft Resource Center. (2010, March 24). 2009 data breach stats. Retrieved November 3, 2010, from

Library of Congress. (n.d.). Timeline of copyright milestones. Retrieved November 4, 2010, from

NCSBN. (2010a). About. Retrieved November 5, 2010, from

NCSBN. (2010b). Map of NLC states. Retrieved November 6, 2010, from https://www.ncsbnorg/158.htm (No longer available at this URL)Instead go to

Ponemon Institute. (2009, April 22). The cost of a lost laptop. Retrieved November 3, 2010, from

Ponemon Institute. (2010, January 25). Ponemon study shows the cost of a data breach continues to increase. Retrieved November 3, 2010, from

PositiveID. (n.d.). HealthID. Retrieved November 4, 2010, from

Privacy Rights Clearinghouse. (2010, October 29). Chronology of data breaches. Retrieved November 3, 2010, from (2006, May 31). Wisconsin bans forced human RFID chipping. Retrieved November 4, 2010, from

Terry, N., & Francis, L. P. (2007). Ensuring the privacy and confidentiality of electronic health records. University of Illinois Law Review. Retrieved from

The University of Melbourne. (2010, October 25). Academic honesty & plagiarism. Retrieved November 4, 2010, from

U.S. Copyright Office. (2010, August). Copyright basics. Retrieved November 4, 2010, from

USG Online Library Learning Center. (n.d.). Plagiarism.  Retrieved November 4, 2010, from

Zinn, J. (2007). The benefits and problems of using health care blogs. Nurse Author and Editor Newsletter, 17(3). Retrieved from

Go to the top of the page

Created February 4, 2012 Updated August 30, 2016

home glossary index Home Glossary Contents of this page