Clinical Data Repositories
Clinical Data Repositories
Nowadays, most institutions have existing clinical data repositories (CDR). in electronic or written
format, to represent an aggregated database of clinical information. The repositories usually house a multitude
of laboratory results, diagnostic reports, and various clinical documentation. These data are readily searchable
and exportable, often because the information is gathered from standard clinical care procedures (Robertson
and Williams, 2016). The repositories integrate physician entered data with data from different existing
information systems including laboratory, radiology, admission, and pharmacy They are placed where both
clinical data and other data of interest, such as external data sources and financial data, are assimilated
(Carter, 2001).
A clinical data repository can successfully depict the same sample across different points in time from
varying sources both within and outside the health institution. Common kinds of available information in the
CDR are listed below:
✓ Patient demographics ✓ Immunizations
✓ Patient's primary care provider ✓ Diagnoses
✓ Medication list ✓ Procedures
✓ Allergies ✓ Laboratory results
✓ Hospital in-patient visits ✓ Social history
✓ Emergency department encounters ✓ Vitals
✓ Outpatient practice visits
Maintaining them poses a lot of advantages since the longitudinal view of a patient's medical
record can assist in improving patient experience, and having information about prior test results
and procedures leads to more informed patient care decisions and helps avoid redundant
treatment.
General Ethics
In public health, general ethics guide the reasoning and decision-making of all people
and organization involved in health care. Two of the ethical principles a health professional must
uphold are autonomy and beneficence and non-maleficence
1. Autonomy
Autonomy is defined as the idea of either allowing individuals to make their own
decisions in response to a particular societal context, or being free from external influence
or control. Electronic health records (EHR) must maintain respect for patient autonomy, and
this entails certain restrictions about the access, content, and ownership records
compromise be reached between levels of patient autonomy and quality of patient records.
When patients are given too much control over their EHRs, this could defeat the purpose of
the use of such document because critical information might be modified or deleted without
the knowledge of the health professionals. Limiting patient access and control over patient
records improves document quality because patients can also verify their own records
(Mercuri, 2010).
2. Beneficence and Non- maleficence
These two principles are respectively defined as do geed and do no harm. In health
informatics, beneficence relates most significantly with the usage of stored data in the EHR
system, and non-maleficence with how the stored data is protected.
Deeply integrated EHR systems will contain substantial amounts of raw data, and great
potential exists for the conduct of groundbreaking biomedical and public health researches.
These kinds of research will be beneficial to both the individual patient and the society. With
this in mind. new EHR systems should be developed with the capacity to allow patients to
release information from their EHRs which can be valuable to researchers and scientists
Similarly, the available consolidated data from clinical data repositories will allow health care
professionals to provide the best possible treatment for their patients, further upholding the
principle of beneficence.
However, the integrated data storage in health informatics is also a breeding ground for
varying threats. Temporary outages, at a minimum, might prevent health care professionals
from performing necessary procedures. At worst, it could even result in significant patient
mortality. Total system failures, however, may cause even greater damage. In order to avoid
these instances, all data must have multiple back-ups for fast and easy recovery. Since
medical records contain very sensitive information about an individual, the highest level of
data security possible should also be upheld. Vulnerabilities in security put patients at a
risky position, and might ultimately lead to the violation of the principle of non-maleficence
(Mercuri, 2010).
Informatics Ethics
Informatics ethics is about the ethical behavior expected from an individual assigned
to handle information. as prescribed by the International Medical Informatics Association
(2016). It follows seven principles:
1. Principle of Information Privacy and Disposition
Everyone has the fundamental right to privacy. Every individual should ensure that he
or she has control over the collection, access, use, communication, manipulation, storage,
linkage, and disposition of data about himself or herself.
2. Principle of Openness
The control measures of particular data should be disclosed to the concerned individual
in an appropriate and timely fashion.
3. Principle of Security
Legitimately collected data should be protected through all appropriate measures against
access, use, modification or communication, manipulation, linkage, loss, degradation, and
unauthorized destruction.
4. Principle of Access
Authorized individuals should be given access to electronic health records and the right
to correct the data with respect to their completeness, accuracy, and relevance.
5. Principle of Legitimate Infringement
The right to privacy and control over personal data should be conditioned by the
appropriate. legitimate, and relevant data-requirement of a democratic society and by the
equal rights of others.
6. Principle of the Least Intrusive Alternative
Any infringement of privacy rights should occur in the least intrusive manner and with
the least amount of interference with the rights of the affected parties.
7. Principle of Accountability
Any infringement must be justified to the concerned individuals in a timely and
appropriate fashion.
Software Ethics
Health informatics ethics relies on the use of the software to store and process
information. It follows that the activities carried out by the developers might affect the end-users.
Therefore, software ethics is the ethical duties and responsibilities of software developers to
the stakeholders (society, institution and employees, and the profession). They should execute
all system activities with the best interest of the society in mind. They should disclose any
threats or known defects in the software. They should ensure that completed activities serve
the best interests of the institution and its employees. They should be straightforward about
their personal limitations and qualifications. Finally, they must build products that meet the
professional standards through testing and detailing unresolved issues. In support of the
mentioned responsibilities of software developers, the management should require ethical
approaches in software development (Samuel & Zaiane, 2014).
The National Research Council (1997) emphasizes that technological security tools are
essential components of modern distributed health care information systems, and that they
serve five key functions:
1. Availability - ensuring that accurate and up-to-date information is available when needed
at appropriate places.
2. Accountability - helping to ensure that health care providers are responsible for their
access to and use of information, based on a legitimate need and right to know
3. Perimeter Identification - knowing and controlling the boundaries of trusted access to the
information system, both physically and logically
4. Controlling Access- enabling access for health care providers only to information essential
to the performance of their jobs and limiting the real or perceived temptation to access
information beyond a legitimate need
5. Comprehensibility and Control - ensuring that record owners, data stewards, and patients
understand and have effective control over appropriate aspects of information privacy and
access
• about an individual's race, ethnic origin, marital status, age, color, and religious,
philosophical, or political affiliations,
• about an individual's health, education, genetic or sexual life of a person, or to any
proceeding or any offense committed or allegedly committed.
• issued by government agencies "peculiar" (unique) to an individual, such as social security
number, and
• marked as classified by an executive order or act of Congress.
The exceptions are
• unauthorized processing.
• processing for unauthorized purposes,
• negligent access.
• improper disposal.
• unauthorized access or intentional breach.
• concealment of breach involving sensitive personal information,
• unauthorized disclosure, and
• malicious disclosure.
Any combination or series of acts enumerated above shall make the person subject to
imprisonment ranging from three (3) years to six (6) years, and a fine of not less than one million
pesos (P1,000,000.00) but not more than five million pesos (P5,000,000.00) (Republic Act No.
10173, Ch. 8, Sec. 33).
Meanwhile, in the health care industry, the following are factors that contribute to the
changes:
1. Regulatory adjustments
2. Shifts in consumer behavior patterns
3. Accelerated pace of IT development
Health care consumers want a more customized experience and greater opportunity to
participate in their health care decisions. This means that health care institutions need to adapt
a more innovative technology, implement an informed patient engagement strategy, and adjust
their organizational structures to drive better patient experiences which may result in numerous
and rapid changes (Quinn, 2017). However, technology alone is not enough. The truth of the
matter that no technology can be successfully implemented without the human factor which
intensifies the work processes and gives the appropriate guidance. The need to find the right
balance between technology and human factor is necessary in the roadmap for organizational
changes.
Another vital element in change management initiatives is communication, Information
should be shared so the stakeholders would be advised about the timing, nature, and
importance of changes in the business Participation from management is crucial to the
successful implementation of the planned changes. Any change can only be successful when
the employees are motivated towards the change and are willing to accept the vision presented
by the organization's leadership (Aljohani, 2016).
Those organizations which are able to manage change well will definitely survive and thrive.
This is basically the concept of change management. The managers need to direct, control, and
monitor the changes to ensure that the objectives are met. They must ensure that the
employees adapt the changes without disrupting the regular operations (Downey, 2008).
Change management process has a wide range of models with each model having its own
strategic approaches. The more common change practice examples include:
1. Kurt Lewin's Unfreeze-Change-Refreeze model
This three-step model was proposed by Kurt Lewin, founder of social psychology, in the
1950s. This is still widely used as the basis for many change management strategies.
2. Proski's ADKAR model
This acronym means "Awareness of the business reasons for change. Desire to engage
and participate in the change: Knowledge about how to change. Ability to implement
change, and Reinforcement to ensure change sticks" (ADKAR).
3. Kotter's Change model
This eight-step model was developed by John Kotter of Harvard Business School
Building a strong collaborative team by using a solid strategy, creating effective
communication channels supporting staff empowerment, using a phased and steady
approach, and securing the change within an organization's culture are the core concepts
of this method (QuickBase, 2017).
• Gathering information about the 'as is' and 'to be status of the current process
• Mapping of the process for both as is' and to be status
• Gap analysis.
• Business case development
• Project management
• Problem solving
• Requirements elicitation techniques
• Negotiation skills
In addition, the progress of the change initiative can be measured against the objectives set
by the organization (Downey, 2008). The said objectives will be measured by the key
performance indicators (KPI) which include reducing rework by x%, improving in stakeholder
satisfaction, for example, comes employee surveys, reducing time to market, enhanced speed
of delivery, and having good return on investment (ROI) which is the total cost to implement the
initiative versus total savings gained from the initiative per period
In the world of health care, some hospitals are reluctant and indignant towards the idea of
change, and they find it difficult to adjust. Thus, health informatics hopes to change the way
health care institutions conduct their business on a daily basis Health care providers need to
welcome change and approach information technology with an open mind. Aziz (2007)
emphasizes that a mechanism for the transformation of business and clinical processes should
be in place By encouraging the adoption of innovation in health care information technology by
clinicians, therapists, nurses, and physicians, health care providers can achieve key come
factors (Table 15.1)
Table 15.1 Key Success Factors
Key success factors at the leadership Key success factors at the program level
level in health care organizations
1. Setting the vision and strategy 1. Clear and timely dissemination of information
roadmap for the organization 2. Building a strong project leadership team and other
functional
teams
2. Forming a governing body to set 3. Providing proper training on the new changes especially on
direction and priorities, and to the workflow and technology
allocate resources 4. Forming integrated teams to address and resolve critical
3. Designating of the organization's and
executive sponsor, departmental complex issues
champions, and program 5. Empowering staff and end-users to improve the process by
manager removing barriers and obstacles
4. Defining reporting requirements 6. Maintaining changes through by positive reinforcement
for the project 7. Frequent celebration of success by acknowledging
5. Setting and managing the users' contributors thus keeping the motivation and momentum
expectations 8. Monitoring and constant measurement of key indicators
(eg, using a dashboard to report progress and benchmarks)
9. Involving those who are affected by the change in decision
making (e.g. choice of computer carts, COW)
10. Other creative actions and incentives e.g, monthly prizes
for high performing teams, providing snacks and drinks
These professionals also ensure that a patient is billed accurately and assure that the
accumulated health care information is compiled and analyzed to assist in making
recommendations that can improve the health services. They are also expected to devise
policies that address concerns on the delivery of high quality health care and the availability of
quality information for decision-making (May, 2014).