Legal and Ethical Informatics
Author Additions to Chapter 25
Websites That Expand on Chapter 25's Knowledge
- Copyright
- Data Security (Chapter 20)
- Ethics
- Fair Use
- HIPAA (Chapter 20)
- HITECH (Chapter 20)
- Legal Issues
- Plagiarism (Chapter 6)
- RFID (Chapter 20)
- Secondary Data Use (Chapter 24)
- Security Audit (Chapter 20)
- Web 2.0 Ethics (Chapter 5)
Copyright
A page, put out by Stanford University, that lists resources pertaining to fair use and copyright. Contains many excellent resources. Don't neglect the President's statement.
http://fairuse.stanford.edu/
Everything you wanted to know about U.S. copyright, but did not know how to ask.
http://www.copyright.gov/
The full copyright law.
http://www.copyright.gov/title17/
The Difference between Copyright Infringement and Plagiarism—and Why It Matters | Peer to Peer Review
http://lj.libraryjournal.com/2016/08/opinion/peer-to-peer-review/the-difference-between-copyright-infringement-and-plagiarism-and-why-it-matters-peet-to-peer-review/?sf33861081=1#_
Ethics
What is a code of ethics. Skip over the Google ads and read the easily understood text.
http://www.wisegeek.com/what-is-a-code-of-ethics.htm
AMIA (American Medical Informatics Association) task force report entitled "Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients" The report provides clear direction to vendors and system purchasers regarding ethics and HIT.
http://jamia.bmj.com/site/icons/amiajnl8946.pdf
AMIA's Code of Professional and Ethical Conduct.
http://jamia.bmj.com/content/early/2012/06/24/amiajnl-2012-001035.full?utm_source=AMIA+e-News+for+members&utm_campaign=d2faa5a551-AMIA_e_News_8_23_12_Webinars_CMS_Final_Rule_Meanin&utm_medium=email
Hurdle, John F.; Adams, Samantha; Broke,Jane; Chang, Betty; Embi, Peter J.; Petersen, Carolyn; Terrazas, Enrique & Winkelstein, Peter (2007). A Code of Professional Ethical Conduct for the American Medical Informatics Association. Journal of the American Medical Informatics Association 14(4), 391–393.
http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=2244909
IMIA Code of Ethics for Health Information Professionals.
http://www.imia-medinfo.org/new2/node/39
Links to Codes of Ethics for many different technological societies sponsored by the Illinois Institute of Technology.
http://ethics.iit.edu/codes/codes_index.html
Dr. Charon Pierson from the University of Texas El Paso has created five, open access video/audio modules on Publication Ethics. Each opens with an example and proceeds from there. The first one is an overview, module two provides information about who is and is not an author, which addresses the problem of authors who just lend their name, but are not really authors including, but not limited to, Bosses, Deans, and Advisors. The third module addresses plagiarism in all its forms. Module four looks at conflicts of interest and the final module provides information about retracted literature. Links to helpful sites are part of the page. Excellent information for students as well as authors or potential authors. CE credit of 2.15 is available for these modules.
http://nursing.utep.edu/resources/publication-ethics/
Fair Use
Copyright and Fair Use. An excellent resource for any use of copyrighted material including academic and Web sites.
Fair_Use_Overview/index.html
Description of Fair Use including a summary of some cases.
http://fairuse.stanford.edu/overview/fair-use/
US Copyright Office on Fair Use. No doubt the last word!
http://www.copyright.gov/fls/fl102.html
Copyright and Fair Use in the UMUC Online or Face-to-Face Classroom
http://www.umuc.edu/library/libhow/copyright.cfm
Fair Use. Has links to many aspects of fair use.
http://en.wikipedia.org/wiki/Fair_use
Legal Issues
Privacy Rights Clearinghouse. Workplace Privacy, An up-to-date page with information about privacy with electronic communication including the telephone.
http://www.privacyrights.org/fs/fs7-work.htm
Amendments, Corrections, and Deletions in the Electronic Health Record. A complete toolkit from the American Health Information Association. http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_044678.hcsp?
dDocName=bok1_044678
Legal Issues in Interstate Practice
Glazer, G. (May 4, 1999). Legislative Column: Legislative and Policy Issues Related to Interstate Practice. Online Journal of Issues in Nursing
http://www.nursingworld.org/MainMenuCategories/ANAMarketplace/ANAPeriodicals/
OJIN/Columns/Legislative/InterstatePracticeStateBill.aspx
Gaffney, T. (May 31, 1999). The Regulatory Dilemma Surrounding Interstate Practice Online Journal of Issues in Nursing 4(1). Manuscript 1. Available: http://www.nursingworld.org/MainMenuCategories/ANAMarketplace/ANAPeriodicals/
OJIN/TableofContents/Volume41999/No1May1999/RegulatoryDilemma.aspx
The National Council of State Boards keeps an updated list of states whose legislatures have approved the "Nurse Licensure Compact" which allows a nurse licensed in participating states to practice in another participating state IF the nurse follows the state laws regulating nursing in that state.
https://www.ncsbn.org/nlc.htm
Hutcherson, Carolyn M. (September 30, 2001). "Legal Considerations for Nurses Practicing in a Telehealth Setting". Online Journal of Issues in Nursing 6(3). Manuscript 3.
http://www.nursingworld.org/MainMenuCategories/ANAMarketplace/ANAPeriodicals/
OJIN/TableofContents/Volume62001/No3Sept01/LegalConsiderations.aspx
Applications and Competencies
Number 2 - Privacy Rights Clearing House - http://www.privacyrights.org then search for data breaches.
Number 3 HIPAA - See Chapter 20 and HITECH in Chapter 20
Number 5 - RFID see Chapter 20
Websites from the Text in Chapter 25
(ANA) Code of Ethics for Nurses (2001), available online at http://nursingworld.org/MainMenuCategories/EthicsStandards/CodeofEthicsforNurses.aspx
Center for Nursing Advocacy website at http://www.nursingadvocacy.org/research/codes_of_ethics.html
Privacy Rights Clearinghouse (2010) maintains an online record of all types of security breaches at http://www.privacyrights.org/
VeriChip http://www.verimedinfo.com/
Copyright tools to assess fair use and information on how copyright applies to education http://www.lib.umn.edu/copyright/
Taking the Mystery out of Copyright http://www.loc.gov/teachers/copyrightmystery/text/files
Google Book Search http://books.google.com/
Appropriate citation and referencing. http://www.sjlibrary.org/services/literacy/info_comp/plagiarism.htm (No longer available at this URL)Instead go to http://tutorials.sjlibrary.org/tutorial/plagiarism/selector.htm
Websites from the Reference List in Chapter 25
Absolute Software. (2010). Built-in protection in laptop PCs improves compliance with new healthcare rules. Retrieved November 3, 2010, from http://www.intel.com/Assets/PDF/whitepaper/health-323461.pdf
ATA. (2007, March). Licensure portability. Retrieved November 4, 2010, from http://www.americantelemed.org/files/public/policy/Licensure_Portability.pdf (No longer available at this URL)Instead go to http://media.americantelemed.org/licensurewebsite/
Bonsor, K., & Keener, C. (2007, November 5). How RFID works. Retrieved November 4, 2010, from http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/rfid.htm
Department of Health and Human Services. (2009). Guidance specifying the technologies and methodologies that render protected health information unusable, unreadable, or indecipherable to unauthorized individuals for purposes of the breach notification requirements under Section 13405 of Title XIII (Health Information Technology for Economic and Clinical Health Act of 2009). Retrieved November 3, 2010, from http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/hitechrfi.pdf
District Court Rules in Perfect 10 v. Google. (2006, February 17). Tech Law Journal. Retrieved from http://www.techlawjournal.com/topstories/2006/20060217b.asp
Gallup Inc. (2009, November 22). Honest/ethics in professions. Retrieved November 1, 2010, from http://www.gallup/com/poll/1654/honesty-ethics-professions.aspx (No longer available at this URL)Instead go to http://www.gallup.com/poll/145043/Nurses-Top-Honesty-Ethics-List-11-Year.aspx
Google. (2010a). About Google books. Retrieved November 4, 2010, from http://books.google.com/googlebooks/about.html
Google. (2010b). Library partners. Retrieved November 4, 2010, from http://books.google.com/googlebooks/partners.html
Google. (2010c). Google books settlement agreement. Retrieved November 4, 2010, from http://books.google.co/googlebooks/agreement/ (No longer available at this URL)Instead go to http://www.googlebooksettlement.com/
HIMSS Analytics. (2009, November). 2009 HIMSS Analytics report: Evaluating HITECH’s impact on healthcare privacy and security. Retrieved November 3, 2010, from http://www.himssanalytics.org/docs/ID_Experts_111509.pdf
Identify Theft Resource Center. (2010, March 24). 2009 data breach stats. Retrieved November 3, 2010, from http://www.idtheftcenter.org/ITRC%20Breach%20Stats%20Report%202009.pdf
Library of Congress. (n.d.). Timeline of copyright milestones. Retrieved November 4, 2010, from http://www.loc.gov/teachers/copyrightmystery/text/files/
NCSBN. (2010a). About. Retrieved November 5, 2010, from https://www.ncsbn.org/156.htm
NCSBN. (2010b). Map of NLC states. Retrieved November 6, 2010, from https://www.ncsbnorg/158.htm (No longer available at this URL)Instead go to https://www.ncsbn.org/nlc.htm
Ponemon Institute. (2009, April 22). The cost of a lost laptop. Retrieved November 3, 2010, from http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/Cost%20of%20a%20Lost%20Laptop%20White%20Paper%20Final%202.pdf
Ponemon Institute. (2010, January 25). Ponemon study shows the cost of a data breach continues to increase. Retrieved November 3, 2010, from http://www.ponemon.org/news-2/23
PositiveID. (n.d.). HealthID. Retrieved November 4, 2010, from http://www.positiveidcorp.com/health-id.html
Privacy Rights Clearinghouse. (2010, October 29). Chronology of data breaches. Retrieved November 3, 2010, from http://www.privacyrights.org/data-breach/new
Spychips.com. (2006, May 31). Wisconsin bans forced human RFID chipping. Retrieved November 4, 2010, from http://www.spychips.com/press-releases/verichip-wisconsin-ban.html
Terry, N., & Francis, L. P. (2007). Ensuring the privacy and confidentiality of electronic health records. University of Illinois Law Review. Retrieved from http://www.law.uiuc.edu/lrev/publications/2000s/2007/2007_2/Terry.pdf
The University of Melbourne. (2010, October 25). Academic honesty & plagiarism. Retrieved November 4, 2010, from http://academichonesty.unimelb.edu.au/plagiarism.html
U.S. Copyright Office. (2010, August). Copyright basics. Retrieved November 4, 2010, from http://www.copyright.gov/circs/circ01.pdf
USG Online Library Learning Center. (n.d.). Plagiarism. Retrieved November 4, 2010, from http://www.usg.edu/galileo/skills/unit08/credit08_03.phtml
Zinn, J. (2007). The benefits and problems of using health care blogs. Nurse Author and Editor Newsletter, 17(3). Retrieved from http://www.nurseauthoreditor.com/article.asp?id=87
Created February 4, 2012 Updated August 30, 2016