Explore chapters and articles related to this topic
Ethical practice and professional decision-making
Published in Michael Weir, Law and Ethics in Complementary Medicine, 2023
There is also some leeway to use or disclose health information where it is unreasonable or impracticable to obtain consent to the use or disclosure, and you reasonably believe the use or disclosure is necessary to lessen or prevent a serious threat to the life, health or safety of any individual, or to public health or safety.93
Ethics of Product Failure and the Courts
Published in Howard Winet, Ethics for Bioengineering Scientists, 2021
What is liability? The FDA imposes regulations that constrain specifications for manufacture of a medical device (or drug). If the specifications are not met and the product fails, severe penalties are inflicted on the manufacturer (and enforced by the DOJ). Regulations are rules set up before a device is made and are decided by a government agency. They are an expression of contractarian ethics. Medical product liability, in contrast, is patient centered because the person the tort is committed against is a patient. There is more. If, in the absence of any negligence, the product posed a physical threat to the patient at a level that required at least a warning stating the degree of risk for the danger, the company is strictly liable unless it minimizes the danger or divulges it in writing. This liability assumes the company is in the best position to correct the imperfect quality or compensate the patient for any injury it causes.
Promoting staff resilience
Published in Alison Brodrick, Emma Williamson, Listening to Women After Childbirth, 2020
Alison Brodrick, Emma Williamson
In midwifery, Hunter and Warren (2014) provided the first study exploring how resilience is experienced in practice. The study describes midwives experiences of ‘protective self-management’ including the ability to recognise stress triggers as a key component of resilience building. In the study, this protective factor is linked to peer support, the ability to reflect and having a balanced, realistic view of expectations and limitations. This relates well to the concept of self-compassion which, when present, is linked to reduced cortisol levels and an ability to self-soothe (Rockliff et al, 2008). In Chapter 2 we discussed activation of the ‘threat system’ and this is also applicable to healthcare professionals. Working in areas that can be unpredictable and fast paced requires an individual to be able to self-soothe and potentially deactivate the ‘threat response’ (Beaumont et al, 2016).
The Critical Dialogue Cornerstone: Suggested Practices to Guide Implementation, Facilitation and Evaluation
Published in Journal of Progressive Human Services, 2022
Alexis Jemal, Liliane Windsor, Christina Inyang, Christina Pierre-Noel
Illustration description: The sun is at the center representing the individual. It is surrounded by planets representing different resources and by meteors representing different threats. Resources include other community members (friendship), organizations (churches, health clinics, government agencies, police), 911, employment, civic engagement (such as protesting together), and democracy. Threats include extreme religious beliefs, criminal behaviors, violence, gangs, indifference, substance use, HIV/ HCV risk behaviors, self-defeating attitudes and self-destructive behaviors, corrupt politicians, and the police. The planets are moving around the sun in an elliptical shape so that sometimes a planet comes close to the sun, and sometimes it is far from the sun. A compass is in a corner representing the different sections of the community.
Cardiac implantable electronic devices and cybersecurity
Published in Expert Review of Medical Devices, 2021
Bhakti Patel, Amgad N. Makaryus
Cybersecurity threats pose significant risks to a patient’s health outcome. Cardiac devices, especially, rely on the remote monitoring feature to allow physicians to efficiently treat patients and access their health data easily. Furthermore, remote monitoring reduces the number of clinical visits for patients. There are numerous ways cybersecurity could affect cardiac devices, including an interruption to care in matter of life situations. The FDA has been working with cardiac device manufacturers and professional cardiology organizations to address any weaknesses and formulate more software updates to improve the security surrounding these devices. Furthermore as devices in the field of cardiology become more mainstream and increase in number, this area and its importance will only increase exponentially over time.
Confronting Cyber Threats to Your Practice
Published in Oncology Issues, 2020
Responses to cyber incidents should follow a playbook. Regardless of the size of your practice or where you are located, your cyber security procedures should be the same. The following is an outline of what a cyber incident prevention and response plan should look like, the questions you should ask of yourself and your information technology (IT) or security team, and what you should do in the event of a worst-case cyberattack scenario. In general, an ideal cybersecurity incident response plan should: Assemble an incident response team.Detect and analyze potential security threats.Disclose incidents when they occur.Contain any damage.Eradicate identified vulnerabilities.Conduct a post-incident analysis.