1. Should corrections be date- and time-stamped?
Yes, corrections, and changes, to any file or document should be time and date stamped (Code of Medical Ethics: Opinion 5.07 Confidentiality: Computers, 1998). It is important to do this so that any changes made can be tracked and any potential harms that may occur or corruption of a file can easily be back tracked to determine what went wrong and who knew or should have known an error took place.
2. When should the patient be advised of the existence of computerized databases containing medical information about the patient?
Patients should be advised of the existence of any computerized databases containing their medical information prior to treatment and prior to any disclosure being made of their information (Code of Medical Ethics: Opinion 5.07 Confidentiality: Computers, 1998).
3. When should the patient be notified of purging of archaic or inaccurate information?
Patients should be advised of the purging of archaic or inaccurate information prior to and after it has been purged (Code of Medical Ethics: Opinion 5.07 Confidentiality: Computers, 1998). This assures patients are fully aware of how their information is treated and may be able to request copies if they wish before date is lost.
4. When should the computerized medical database be online to the computer terminal?
Only when authorized computer programs requiring the medical date are being used (Code of Medical Ethics: Opinion 5.07 Confidentiality: Computers, 1998). This helps protect confidentiality.
5. When the computer service bureau destroys or erases records, should the erasure be verified by the bureau to the physician?
Yes, the bureau must tell the physician prior to erasure and must confirm erasure after it has occurred (Code of Medical Ethics: Opinion 5.07 Confidentiality: Computers, 1998). This will continue to assure physicians are aware of what has occurred to their records.
6. Should individuals and organizations with access to the databases be identified to the patient?
Yes, they should in order to provide a patient complete information about who has access to their information (Code of Medical Ethics: Opinion 5.07 Confidentiality: Computers, 1998).
7. Does the AMA ethics opinion mention encryption as a technique for security?
Yes. It is a means to control access to computer information (Code of Medical Ethics: Opinion 5.07 Confidentiality: Computers, 1998).
8. What does the ethics opinion say about disclosure by recipients of authorized data to third parties?
The opinion indicates that they“should be advised that authorized release of data to them does not authorize their further release of the data to additional individuals or organizations, or subsequent use of the data for other purposes” (Code of Medical Ethics: Opinion 5.07 Confidentiality: Computers, 1998). This helps maintain control over who has access to the information.
References
Code of Medical Ethics: Opinion 5.07 Confidentiality: Computers. (1998). American Medical Association. Retrieved February 22, 2009, from