By the end of this lesson you will be able to:
Every time you send an email, post a comment, or share a file online, you are participating in a digital community. Digital citizenship is the practice of using technology responsibly, ethically, and respectfully. For healthcare professionals, this extends beyond personal communication to every interaction that involves patients, colleagues, and protected health information.
Netiquette (a combination of "internet" and "etiquette") refers to the accepted rules of polite behavior in online communication. While these guidelines apply to everyone, they carry extra weight in healthcare because a poorly worded email or a careless social media post can violate patient privacy, damage professional relationships, or even result in legal consequences.
Pro Tip: Before sending any professional email, read it aloud. If it sounds harsh, vague, or could be misunderstood, revise it. A two-minute review can prevent a misunderstanding that takes hours to resolve.
In both your academic work and your future healthcare career, you will regularly use information created by others, including research articles, images, instructional materials, and data. Understanding intellectual property (IP) and copyright protects you from legal trouble and ensures you give proper credit to the people whose work you use.
Intellectual property refers to creations of the mind that are protected by law. Copyright specifically protects original works of authorship, including the following:
Copyright protection is automatic. The moment someone creates an original work and records it in a tangible form, it is copyrighted. You do not need to see a copyright symbol to assume a work is protected.
Fair use allows limited use of copyrighted material without permission for purposes such as education, criticism, and research. However, fair use has limits. Copying an entire article and submitting it as your own work is not fair use. It is plagiarism.
Creative Commons licenses allow creators to share their work with specific permissions. Some licenses allow free reuse with attribution, while others restrict commercial use or modifications. When searching for images or resources for school projects, look for Creative Commons-licensed content to stay on the right side of the law.
Plagiarism is presenting someone else's work, ideas, or words as your own without proper attribution. In your academic career at UMA, plagiarism can result in a failing grade or disciplinary action. In a professional healthcare setting, plagiarism in published research or clinical documentation can lead to job loss and damage to your professional reputation.
To avoid plagiarism, follow these practices:
The internet provides extraordinary access to information, communication, and tools, but it also exposes you to risks. Cybersecurity is the practice of protecting computers, networks, and data from unauthorized access, theft, and damage. According to the Cybersecurity and Infrastructure Security Agency (CISA), healthcare is one of the most targeted industries for cyberattacks because of the value of medical records on the black market.
Phishing is a social engineering attack in which a criminal sends a fraudulent message, usually an email, designed to trick you into revealing sensitive information such as passwords, credit card numbers, or login credentials. According to the Federal Trade Commission (FTC), phishing emails often do the following:
How to spot phishing: Hover over links before clicking to check the actual URL. Look for misspellings in the sender's email address. Be suspicious of unexpected attachments. When in doubt, contact the organization directly using a phone number from their official website, not from the email.
Malware (malicious software) is any software designed to damage, disrupt, or gain unauthorized access to a computer system. Common types include the following:
Social engineering is the use of psychological manipulation to trick people into making security mistakes. Unlike technical hacking, social engineering targets human behavior. Examples include the following:
Defense: Never share your password with anyone, even if they claim to be from your IT department. Verify requests through a separate, trusted communication channel.
Healthcare Connection: In 2024, a major U.S. healthcare system experienced a ransomware attack that disrupted operations for weeks, affecting patient scheduling, prescription processing, and insurance claims. The attack began with a single phishing email. Every employee in a healthcare organization, from administrators to clinical staff, plays a role in cybersecurity. One click on a malicious link can compromise the records of thousands of patients.
You receive an email that appears to be from "UMA IT Department" with the subject line "URGENT: Account Verification Required." The sender address is uma-support@gmail.com. The email states your account will be suspended in 24 hours unless you click a link to verify your credentials.
What should you do?
You reported the email. Later, a colleague mentions they clicked the link in the same email and entered their password, but "nothing happened" so they think it's fine.
What should you advise your colleague?
IT confirms it was a phishing attack and 3 employees clicked the link. The clinic director asks what could have prevented this.
What is the most effective prevention measure?
Recognizing phishing emails is one of the most critical cybersecurity skills in healthcare. Every employee who can identify and report a phishing attempt helps protect patient data and organizational systems.
Your digital identity is the collection of information about you that exists online, including your email accounts, social media profiles, online purchases, and the data that websites and apps collect about your behavior. Protecting this identity requires a combination of strong habits and the right tools.
According to Microsoft and CISA, a strong password is your first line of defense against unauthorized access. Follow these guidelines:
| Guideline | Why It Matters | Example |
|---|---|---|
| Use at least 12 characters | Longer passwords are exponentially harder to crack | SunriseClinic2026! |
| Mix character types | Uppercase, lowercase, numbers, and symbols increase combinations | M@ple.Tree#42 |
| Avoid personal information | Birthdays, pet names, and addresses are easy to guess | Do not use Fluffy2001 |
| Use unique passwords for each account | If one account is compromised, the others remain safe | Use a password manager to track them |
| Enable two-factor authentication (2FA) | Adds a second verification step beyond just a password | A text message code or authenticator app |
If you work in healthcare in the United States, you are required by law to protect patient information. The Health Insurance Portability and Accountability Act (HIPAA) establishes national standards for the protection of sensitive patient health information, known as Protected Health Information (PHI).
PHI includes any individually identifiable health information that is created, received, maintained, or transmitted by a healthcare provider, health plan, or healthcare clearinghouse. According to the U.S. Department of Health and Human Services (HHS), PHI includes the following:
As a healthcare professional using computers daily, HIPAA compliance means following specific practices with every digital interaction:
Press Windows key + L every time you step away from your computer. An unlocked screen in a medical office is a HIPAA violation waiting to happen.
Never share your login credentials. Each staff member must have their own unique login for audit trail purposes.
Never send PHI through regular email or text messages. Use your organization's approved secure messaging system.
Access only the patient information you need for your specific job duties. Browsing records out of curiosity is a violation.
HIPAA violations carry serious penalties. According to HHS, consequences can range from corrective action plans to significant fines and criminal charges:
Healthcare Connection: A medical assistant at a small clinic accesses her neighbor's medical records because she is curious about a recent hospital visit. Even though she does not share the information with anyone, this is a HIPAA violation. The "minimum necessary" standard means you should only access records directly related to your job duties. The medical assistant could face termination, a fine, and a permanent mark on her professional record.
Click the card to flip it