Do No Harm 2.0

Total Page:16

File Type:pdf, Size:1020Kb

Do No Harm 2.0 October 2019 Do No Harm 2.0 Robert Lord & Dillon Roseen Last edited on October 16, 2019 at 10:47 a.m. EDT Acknowledgments Dr. David Mussington, Professor, UMD School of Special thanks also goes to Gabe Nicholas, whose Public Policy and Board Director, (ISC)2 extensive work in the final stages of this paper aided greatly in creating the finished product you hold Mitchell Parker, Executive Director, Information today. Security and Compliance, IU Health The authors would like to thank the countless Michael Prebil, Program Associate, New America independent privacy and security experts, healthcare Joy Pritts, Principal, Pritts Consulting practitioners, executive leaders in healthcare, and experts in artificial intelligence, information Lucia Savage, Chief Privacy Officer, Omada Health technology systems, and workforce development whose work made this report possible. Specific John Schwartz, Chief Information Security Officer, thanks go to those individuals who provided Health Quest thoughtful commentary throughout the development of this project, including: Heidi Shey, Principal Analyst, Forrester Laura Bate, Policy Analyst, New America Dave Summitt, Chief Information Security Officer, Moffitt Cancer Center Rear Admiral Susan J. Blumenthal (Ret.), MD, MPA, Senior Fellow in Health Policy, New America Hussein Syed, Chief Information Security Officer, RWJBarnabas Health Daniel Bowden, VP and Chief Information Security Officer, Sentara Healthcare Ian Wallace, Senior Fellow, New America Mark Combs, CIO, Steptoe and Johnson, PLLC Beau Woods, Cyber Safety Advocate, I Am The Cavalry Carlos Cruz, SVP/Chief Compliance Officer, Tri-City Medical Center Please Note: The affiliations of the noted individuals in no way indicate organizational endorsement of the J. Michael Daniel, President, Cyber Threat Alliance recommendations in this report. Each of these individuals has merely provided commentary, insights Dante Disparte, Founder, Chairman and CEO, Risk and enhancements that we are very thankful for. Cooperative We also wish to acknowledge the supporters of the Matt Doan, Cybersecurity Policy Fellow, New New America Cybersecurity Initiative whose support America helped make this paper possible, notably the Citi Foundation (through their support to New America’s Matt Fisher, Partner, Mirick O’Connell Millennial Public Policy Fellows Program), Florida Michael Fried, CIO, Baltimore City Health International University and the Hewlett Foundation. Department Chandresh Harjivan, Partner and Managing Director at the Boston Consulting Group (BCG) David Holtzman, VP, Compliance Strategies, CynergisTek Peter James, Founder, Amen Ra Security Robert Morgus, Fellow, New America newamerica.org/cybersecurity-initiative/reports/do-no-harm-20/ 2 About the Author(s) The Initiative seeks to address issues others can’t or don’t and create impact at scale. Robert Lord is a fellow in New America’s Cybersecurity Initiative and the lead adviser to the Healthcare Cybersecurity Project. Lord is the co- founder and president of Protenus, an analytics platform that leverages artificial intelligence to detect data breaches in healthcare. Before co- founding Protenus, Lord was an MD candidate at the Johns Hopkins University School of Medicine. Prior to medical school, Lord was an investment associate at Bridgewater Associates, the world’s leading hedge fund. Robert received his A.B. in social studies, magna cum laude, from Harvard University. Dillon Roseen is a law student at the University of Michigan School of Law. He was a Millennial Public Policy Fellow in New America’s Cybersecurity Initiative and the staff lead for the Healthcare Cybersecurity Project. Roseen, from Peachtree City, Ga., was a Fulbright Scholar in Amsterdam where he conducted research on the intersection of law, politics, and international security and earned an LL.M. from Vrije Universiteit Amsterdam. Previously, he graduated with highest honors from the Georgia Institute of Technology. About New America We are dedicated to renewing America by continuing the quest to realize our nation’s highest ideals, honestly confronting the challenges caused by rapid technological and social change, and seizing the opportunities those changes create. About Cybersecurity Initiative The goal of New America’s Cybersecurity Initiative is to bring the key attributes of New America’s ethos to the cybersecurity policy conversation. In doing so, the Initiative provides a look at issues from fresh perspectives, an emphasis on cross-disciplinary collaboration, a commitment to quality research and events, and dedication to diversity in all its guises. newamerica.org/cybersecurity-initiative/reports/do-no-harm-20/ 3 Contents Executive Summary 6 Foreword by Sen. Mark Warner 8 Personal Introduction by Robert Lord 10 Chapter 1: Why Should We Care? 15 I. Cybersecurity Is A Patient Safety Imperative 15 II. The Case for Urgent Action 16 III. The Cybersecurity Risk Landscape Facing the Healthcare Sector 17 Chapter 2: How Did We Get Here? 24 Chapter 3: Culture 26 I. Summary 26 II. Healthcare-Specific Culture Challenges 28 III. Healthcare Culture Policy Recommendations 34 Chapter 4: Technology 43 I. Summary 26 II. Healthcare-Specific Technology Challenges 45 III. Healthcare Technology Policy Recommendations 50 newamerica.org/cybersecurity-initiative/reports/do-no-harm-20/ 4 Contents Cont'd Chapter 5: Workforce 60 I. Summary 26 II. Healthcare-Specific Workforce Challenges 62 III. Healthcare Workforce Policy Recommendations 65 Chapter 6: Conclusion 75 Appendix: Summary of Policy Recommendations 77 Culture 77 Technology 78 Workforce 79 newamerica.org/cybersecurity-initiative/reports/do-no-harm-20/ 5 Executive Summary While this report is ostensibly about cybersecurity in healthcare, we hope it is remembered as yet another contribution to the broader body of patient safety literature in medicine, albeit an unorthodox one. Specifically, we aim to highlight the need to mitigate the risks to patient safety created by the growing integration of information technology and operational technology into healthcare, and to propose ways to mitigate that risk. The report takes as a core premise that there is great benefit to be had from technology adoption, but also that in order to achieve that benefit, action will be required to prevent those same systems— either maliciously or by accident—leading to patient harm. Recognizing that this is a complex systemic challenge, the report ofers 17 actionable recommendations which we believe could make a real impact. These recommendations are organized across three pillars: culture, technology and workforce. The report begins with a personal introduction by co-author Robert Lord which makes the case that information security should be at the heart of modern healthcare by pointing to Hippocratic Oath of “Do No Harm,” which has long underpinned the work of healthcare professionals. Since the potential harms posed to patients today are not what they once were, he argues that “Do No Harm 2.0,” requires significantly more attention and resources to be applied to cybersecurity by the healthcare sector. Next, Chapter One—“Why Should We Care?”—gives a high-level overview describing the cybersecurity challenges and constraints facing the healthcare sector. Some of these challenges are unique to healthcare while others will be familiar to cybersecurity experts in other fields. The chapter will be most useful for those who want to better understand the cybersecurity threats the healthcare sector will face over the next five years. This chapter is designed to give action- oriented colleagues a set of arguments to support their efforts for change. Chapter Two of this report—“How Did We Get Here?”—looks back at the major policies, technological innovations, and cybersecurity incidents that have shaped the current healthcare cybersecurity landscape. This chapter is for those who want to better understand the structural context underpinning technology and cybersecurity developments in the healthcare sector. By providing historical context, we hope to help ensure that future efforts will build on, rather than repeat, past attempts at improvement. Chapters Three, Four, and Five constitute the major policy recommendations of this report. Each one tackles a set of recommendations centered on one of the three pillars mentioned above, culture, technology, and workforce. The policies in these chapters are relevant for policymakers in federal, state, and local newamerica.org/cybersecurity-initiative/reports/do-no-harm-20/ 6 governments, as well as healthcare leaders who can shape the internal policies of their health systems and organizations. The report concludes with a “call to arms” couched with optimism that this is a solvable problem if proper action is taken and appropriate resources are committed. newamerica.org/cybersecurity-initiative/reports/do-no-harm-20/ 7 Foreword by Sen. Mark Warner The WannaCry ransomware attacks in 2017 demonstrated that cyber-attack targets have moved from being concentrated on finance and government entities, to other industries like health care, telecommunications, and logistics, with the attack surface growing to include vulnerabilities in hardware as well as software. The rapid adoption of technology in health care has the potential to improve the quality of patient care, expand access to care, and reduce wasteful spending. However, such technology also has the power to put patients at risk as it facilitates the proliferation of valuable personal health care data. To support the benefits of health
Recommended publications
  • "First, Do No Harm.” March 28, 2007
    "First, do no harm.” March 28, 2007 Table of Contents Executive Summary & Recommendations ................................................................................................5 Introduction .............................................................................................................................................11 1. Protecting Children and Family Preservation .............................................................................15 2. 51A Reports and Mandated reporters ........................................................................................20 3. DSS Investigations.....................................................................................................................25 4. DSS Staffing...............................................................................................................................27 5. DSS Records Management........................................................................................................34 6. DSS Critiques.............................................................................................................................37 7. Law Enforcement Involvement...................................................................................................39 8. Private Providers........................................................................................................................40 9. Risk Assessment........................................................................................................................43
    [Show full text]
  • ENGLISH 2810: Television As Literature (V
    ENGLISH 2810: Television as Literature (v. 1.0) 9:00 – 10:15 T/Th | EH 229 Dr. Scott Rogers | [email protected] | EH 448 http://faculty.weber.edu/srogers The Course The average American watches about 5 hours of television a day. We are told that this is bad. We are told that television is bad for us, that it is bad for our families, and that it is wasting our time. But not all television is that way. Some television shows have what we might call “literary pretensions.” Shows such as Twin Peaks, Homicide: Life on the Street, The Wire, Buffy the Vampire Slayer, Firefly, Veronica Mars, Battlestar Galactica, and LOST have been both critically acclaimed and the subject of much academic study. In this course, we shall examine a select few of these shows, watching complete seasons as if they were self-contained literary texts. In other words, in this course, you will watch TV and get credit for it. You will also learn to view television in an active and critical fashion, paying attention to the standard literary techniques (e.g. character, theme, symbol, plot) as well as televisual issues such as lighting, music, and camerawork. Texts Students will be expected to own, or have access to, the following: Firefly ($18 on amazon.com; free on hulu.com) and Serenity ($4 used on amazon.com) LOST season one ($25 on amazon.com; free on hulu.com or abc.com) Battlestar Galactica season one ($30 on amazon.com) It is in your best interest to buy or borrow these, if only to make it easier for you to go back and re-watch episodes for your assignments.
    [Show full text]
  • Holistic Jurisprudence: Law Shaped by People of Faith
    St. John's Law Review Volume 74 Number 3 Volume 74, Summer 2000, Number 3 Article 11 Holistic Jurisprudence: Law Shaped by People of Faith Kenneth A. Sprang Follow this and additional works at: https://scholarship.law.stjohns.edu/lawreview This Article is brought to you for free and open access by the Journals at St. John's Law Scholarship Repository. It has been accepted for inclusion in St. John's Law Review by an authorized editor of St. John's Law Scholarship Repository. For more information, please contact [email protected]. HOLISTIC JURISPRUDENCE: LAW SHAPED BY PEOPLE OF FAITH KENNETH A. SPRANG * He has told you, 0 mortal, what is good; and what does the LORD require of you but to do justice, and to love kindness, and to walk humbly with your God.' To be a lawyer and at the same time to be a faithful Christian or other person of faith is difficult-some would say impossible. 2 Some resolve the crisis by tossing in the towel and leaving the profession.3 Others resolve their cognitive dissonance by rationalizing that there is no conflict between law and faith at all.4 Still others recognize the tension between the challenges of the faith and the demands of the law, and seek to maintain some balance between the two. 5 The tension is not new, of course. The writer of Luke's gospel tells the story of Jesus lambasting the Pharisees because * Associate Professor, Barry University School of Law. J.D., Case Western Reserve University; M.A., University of Michigan; B.S., The Ohio State University.
    [Show full text]
  • The Expression of Orientations in Time and Space With
    The Expression of Orientations in Time and Space with Flashbacks and Flash-forwards in the Series "Lost" Promotor: Auteur: Prof. Dr. S. Slembrouck Olga Berendeeva Master in de Taal- en Letterkunde Afstudeerrichting: Master Engels Academiejaar 2008-2009 2e examenperiode For My Parents Who are so far But always so close to me Мои родителям, Которые так далеко, Но всегда рядом ii Acknowledgments First of all, I would like to thank Professor Dr. Stefaan Slembrouck for his interest in my work. I am grateful for all the encouragement, help and ideas he gave me throughout the writing. He was the one who helped me to figure out the subject of my work which I am especially thankful for as it has been such a pleasure working on it! Secondly, I want to thank my boyfriend Patrick who shared enthusiasm for my subject, inspired me, and always encouraged me to keep up even when my mood was down. Also my friend Sarah who gave me a feedback on my thesis was a very big help and I am grateful. A special thank you goes to my parents who always believed in me and supported me. Thanks to all the teachers and professors who provided me with the necessary baggage of knowledge which I will now proudly carry through life. iii Foreword In my previous research paper I wrote about film discourse, thus, this time I wanted to continue with it but have something new, some kind of challenge which would interest me. After a conversation with my thesis guide, Professor Slembrouck, we decided to stick on to film discourse but to expand it.
    [Show full text]
  • Somerset County Library Wellness Made Easy Collection Adult Books
    Somerset County Library Wellness Made Easy Collection Adult Books Title: Bad Advice: Or Why Celebrities, Politicians, and Activists Aren't Your Best Source of Health Information By: Paul Offit M.D. Description: Paul A. Offit shares hard-earned wisdom on the dos and don’ts of battling misinformation. For the past twenty years, Offit has been on the front lines in the fight for sound science and public health. Title: 100 No-Equipment Workouts Vol. 1: Fitness Routines you can do anywhere, Any Time By: Neila Rey Description: The 100 Workouts Book is for everyone who wants to stay active, get fit, build muscle tone and/or shed extra weight in the home environment without acquiring any extra equipment. Be in complete control of your fitness. No more worrying about the right equipment, the right attire, finding a gym, or finding the space or time to exercise. Title: 100 No-Equipment Workouts Vol. 2: Easy to follow home workout routines with visual guides for all fitness levels By: Neila Rey Description: The 100 No-Equipment Workouts Volume 2 is for everyone who wants to stay active, get fitter, improve muscle tone and feel better. Find a workout you like, perform it to your level and set your goals to go higher and conquer it. A wide variety of workouts means you will never run out of challenges. Title: The African American Guide to Living Well with Diabetes By: Constance Brown-Riggs, Tamara Jeffries Description: This comprehensive guide includes: the latest medical treatments for diabetes- medications, insulin therapies, blood glucose monitors, plus the pros and cons of supplements, herbs and alternative diets.
    [Show full text]
  • No. ICC-01/04-02/06 1/93 7 June 2021 Term 9 Au Original: English
    ICC-01/04-02/06-2675 07-06-2021 1/93 RH OA4 term 9 au Original: English No.: ICC-01/04-02/06 Date: 7 June 2021 THE APPEALS CHAMBER Before: Judge Marc Perrin de Brichambaut, Presiding Judge Piotr Hofmański Judge Luz del Carmen Ibáñez Carranza Judge Solomy Balungi Bossa Judge Gocha Lordkipanidze SITUATION IN THE DEMOCRATIC REPUBLIC OF THE CONGO IN THE CASE OF THE PROSECUTOR V. BOSCO NTAGANDA Public Defence Appellant Brief against the 8 March Reparations Order Source: Defence Team of Mr Bosco Ntaganda No. ICC-01/04-02/06 1/93 7 June 2021 ICC-01/04-02/06-2675 07-06-2021 2/93 RH OA4 Document to be notified in accordance with regulation 31 of the Regulations of the Court to: The Office of the Prosecutor Counsel for the Defence* Ms Fatou Bensouda Me Stéphane Bourgon, Ad.E. Mr James Stewart Me Kate Gibson Ms Nicole Samson Me Mélissa Beaulieu Lussier Me Laurence Hortas-Laberge Legal Representatives of Victims Legal Representatives of Applicants Ms Sarah Pellet Ms Anna Bonini Mr Dmytro Suprun Ms Anne Grabowski Unrepresented Victims Unrepresented Applicants (Participation / Reparation) The Office of Public Counsel for The Office of Public Counsel for the Victims Defence Paolina Massidda States’ Representatives Amicus Curiae REGISTRY Registrar Counsel Support Section Mr Peter Lewis Victims and Witnesses Unit Detention Section Victims Participation and Reparations Trust Fund for Victims Section Mr Pieter de Baan Mr Philipp Ambach * The Defence acknowledges and is thankful for the contribution of Ms. Camille Divet and Ms. Haneen Ghali. No. ICC-01/04-02/06 2/93 7 June 2021 ICC-01/04-02/06-2675 07-06-2021 3/93 RH OA4 TABLE OF CONTENTS INTRODUCTION AND OVERVIEW ...............................................................................................................
    [Show full text]
  • Do No Harm / Val Hildreth-Werker ( .Pdf )
    Part 3-Restoration: Hildreth-Werker-Do No Harm 329 Section C-Restoring Cave Passages Do No Harm Val Hildreth-Werker Primum non nocere. First, do no harm. All-important in cave restoration is the notion of leaving things better than we found them-while avoiding new harm to biota, habitat, or other cave resources. When considering a project-assess, plan, and avoid creating new problems. Thoroughly evaluate the restoration tasks. Carefully design the workload and crew assignments. Conscientiously avoid causing new restoration dilemmas in the cave passages. When the project is complete, clean up any leftover mess. These are simple, universal precepts. Can we actually achieve no harm when we're in a cave sopping, scrub- Many cave bing, scraping, and disrupting the microcosm? resources are The words, no harm, have a meaningful and memorable ring. It is a lofty, nonrenewable or idealistic objective. irreplaceable. Some The potential of causing no new harm is relative to the damage that has cave species and already been done, the number of visitors that have already tromped through, the fragility or durability of the resources, and the historical some speleothems stewardship of a passage. Previous anthropogenic alterations within a cave are fragile. will influence restoration goals and no harm objectives. Project planning Subterranean includes defining what natural or historical period to target restoration ecosystems, along a continuum of ecosystems, anthropological impacts, and aesthetics. sometimes hanging Many cave values are nonrenewable or irreplaceable. Some cave species and some speleothems are fragile. Subterranean ecosystems, sometimes in delicate balance, hanging in delicate balance, may be easily disturbed.
    [Show full text]
  • Protective Orders in Texas 2003
    Do No Harm Protective Orders in Texas 2003 TEXAS COUNCIL ON FAMILY VIOLENCE P.O. Box 161810 Austin, Texas 78716 512/794-1133 Fax: 512/685-6396 www.tcfv.org DO NO HARM: Protective Orders in Texas 2003 Edition ACKNOWLEDGEMENTS Updated by Nancy Flores, JD and Lori-Ann Lima, Public Policy Specialists, Texas Council on Family Violence. Original text written by Jodie Reaver. The Texas Council on Family Violence (TCFV) extends our gratitude to the Governor’s Office/Criminal Justice Division of Texas, for recognizing the importance of this project and for providing the support needed to make the 2003 Edition of Do No Harm: Protective Orders in Texas possible. We would like to thank our contributing writers, reviewers, editors, and others for their valuable assistance with this edition: • Barbra McLendon, Public Policy Director, TCFV • Debbie Carter, Public Policy Coordinator, TCFV • Diane Aldridge, Public Policy Assistant, TCFV • Havilah Tower-Perkins, Communications Specialist, TCFV • Diana Meriggi, Communications Coordinator, TCFV We would also like to thank the following contributors for their assistance in previous editions : Bree Buchanan, J.D., Jennifer Corrigan, Iliana Rodriquez, Eduardo Montiel, Kathleen Claps, Sharon Brooks, Travis County Attorney’s Office, Michelle Clark, Tina Price, Attorney, Legal Advocate, Women’s Haven, Domestic Violence Report, Northeastern University Press, National Institute of Justice, Jim Loveless, J.D. Special thanks for agreeing to be photographed for the cover goes to: Sharon Brooks, Chief, Protective Orders Division, Travis County Attorney’s Office, Joan Myers Carter, SafePlace Sr. Legal Advocate, Judge Mike Denton, County Court at Law No. 4, Domestic Violence Court, Travis County Courthouse, Andrew J.
    [Show full text]
  • Conflict Sensitivity and Food Programming: Do No Harm Pocket
    Field Guide CONFLICT SENSITIVITY AND FOOD PROGRAMMING Do No Harm Pocket Guide Do No Harm for Quality Programming: World Vision International Food Programming and Management Group World Vision International Food Programming Management Group 1 ‘Do No Harm’ Acknowledgements The Do No Harm guide is a collaborative effort built upon the contributions of many great minds within World Vision and beyond. It is important to mention Killen Otieno and James Odong, who nurtured the initial idea of a field guide. The duo drafted the Terms of Reference for the production of this guide and provided technical oversight during the production process. Special acknowledgement goes to three other World Vision staff: Walter Middleton (Partnership Leader, Food Security & Livelihoods), Dr. Bill Lowrey (former Director of Peacebuilding) and Thabani Maphosa (Global Director, Food Programming and Management Group, FPMG). They provided leadership, guidance and cross-program linkages and support. Their commitment and focus in promoting conflict sensitivity in food programming greatly contributed to the success of this manual. In addition, we thank key experts from FPMG who tirelessly devoted their knowledge, skills and time to make this guide a success. Marumbo Ngwira brought in her DM&E expertise. Elie Gasagara provided oversight and shared his wealth of knowledge in accountability and protection besides providing leadership of the process from FPMG. Kathryn Taetzsch provided overall management, editorial support and funds acquisition that made this work possible. We also acknowledge the key contribution of the two consultants who work with the team to produce this publication. Michelle Garred drafted the initial draft of the DNH field guide while Sara Davidson built on the initial work to produce a revised draft that evolved into this publication.
    [Show full text]
  • Outcomes Requiring Additional Consideration
    OUTWARD BOUND CENTER FOR PEACE BUILDING & SEARCH FOR COMMON GROUND YSEP ’09 EVALUATION SECTION II: OUTCOMES REQUIRING ADDITIONAL CONSIDERATION 1. SUMMARY That none of the data suggested failures or hinted at unintended consequences provides another form of validation of YSEP’09. Even where some outcomes were weak, the fundamental precept “do no harm” was observed. Some of the evaluation’s findings for primary program objectives were so ambiguous that conclusions could not be drawn. Ambiguity in the data could have resulted from any number of problems unrelated to the actual outcomes. Participants may not have recognized what they learned: “For sure, this experiment has taught each and every one of us a lot, although most of the things we have gained, we haven’t realized them yet. Maybe we will never realize them, but they will always be there in our daily life, in our daily actions, in our daily decisions.” (Participant, Texas Pin Ceremony transcript) Or, participants were uncertain that observed changes could be attributed to the program: “There are things that changed in the last one or two months, that I can't tell if it came out of the program or from my ripeness.” (Participant, Exit Interview) Furthermore, the form and language of each question and context in which it was asked could have significant bearing on a response. A case-in-point occurred when an on-line survey asked each respondent to use a number scale to rate his/her agreement with the statement “I communicate more effectively.” Outcomes using only this scale would seem relatively good.
    [Show full text]
  • and Do No Harm.’
    Special Report ‘. and Do No Harm.’ Steven Hetts, Alison Werne, and Grant B. Hieshima During my 20-year evolution with this new complex neurovascular disease. Although en- specialty, I have been unable to emotionally dovascular approaches have often resulted in detach from my patients, and recently I have profound advances, there is very little mention begun to explore, with the help of my coau- of the occasional devastating failures. thors, the adaptive mechanisms that permit In medical school, doctors are introduced to continued survival.—G.B.H. general guidelines to assist patients and fami- lies through catastrophic illness and death. Un- Doctors are trained to heal, not to harm. fortunately, there has been a paucity of training When, in the course of medical practice, the for constructive transition through grief experi- condition of a patient worsens instead of im- enced by the physician when a devastating out- proves after a doctor has intervened, strong come occurs in a patient (5, 6). A common emotions, including sorrow, remorse, and an- belief is that the physician, in maintaining an ger, can be evoked on both sides of the doctor– objective and scientific approach to patient patient relationship. However, in pursuit of heal- care, is insulated from the emotions attached to ing patients, doctors often forget the wisdom of the suffering of the patient and family (7, 8). the oft-maligned aphorism, “physician, heal thyself.” After a medical tragedy occurs, most The ability to intellectualize the process of dis- doctors turn their introspection not on their ease and the complications associated with emotions, but on their knowledge.
    [Show full text]
  • First Do No Harm: Least Restrictive Alternative Analysis and the Right of Mental Patients to Refuse Treatment
    Volume 83 Issue 3 Article 3 April 1981 First Do No Harm: Least Restrictive Alternative Analysis and the Right of Mental Patients to Refuse Treatment David Zlotnick Law Clerk, United States District Court for the District of New Jersey Follow this and additional works at: https://researchrepository.wvu.edu/wvlr Part of the Constitutional Law Commons, and the Mental and Social Health Commons Recommended Citation David Zlotnick, First Do No Harm: Least Restrictive Alternative Analysis and the Right of Mental Patients to Refuse Treatment, 83 W. Va. L. Rev. (1981). Available at: https://researchrepository.wvu.edu/wvlr/vol83/iss3/3 This Article is brought to you for free and open access by the WVU College of Law at The Research Repository @ WVU. It has been accepted for inclusion in West Virginia Law Review by an authorized editor of The Research Repository @ WVU. For more information, please contact [email protected]. Zlotnick: First Do No Harm: Least Restrictive Alternative Analysis and the West Virginia Law Review Volume 83 Spring 1981 Number 3 FIRST DO NO HARM: LEAST RESTRICTIVE ALTERNATIVE ANALYSIS AND THE RIGHT OF MENTAL PATIENTS TO REFUSE TREATMENT DAVID ZLOTNICK* I. Introduction .................................. 376 II. The Least Restrictive Alternative Doctrine ....... 384 A. History of the Doctrine ..................... 385 B. Different Aspects of the Doctrine's Analysis .. 392 C. The Doctrine's Role in Mental Health Law .... 400 III. The Right to Refuse Treatment ................. 405 A. The Competing Interests of the Individual and the State .......................... 405 1. The Liberty Interest of the Individual .... 406 2. The State Interest in Compelling Treatment ...........................
    [Show full text]