Introduction
This essay examines the ethical responsibilities associated with a portable medical device for remote patient monitoring (RPM), a technology identified in a prior assignment, within the framework of the ACM Code of Ethics. The ACM Code, established by the Association for Computing Machinery, outlines principles such as contributing to societal well-being, avoiding harm, and ensuring professional competence (ACM, 2018). By focusing on this health-oriented computing technology, which enables real-time data collection and transmission for patient care, the discussion identifies responsibilities for technology providers, implementers (in this case, the author as a computing student), and end users. The analysis draws on these principles to explore potential consequences of ethical lapses, methods for verifying standards, and appropriate actions when concerns arise. This structure aims to provide a comprehensive understanding of ethical application in capstone computing projects, highlighting the interplay between technology and professional accountability.
Overview of the RPM Technology and ACM Code Principles
The portable medical device for remote patient monitoring represents an innovative intersection of computing and healthcare, allowing patients to track vital signs such as heart rate and blood pressure from home, with data securely transmitted to healthcare professionals. This technology aligns with computing advancements in telemedicine, yet it raises ethical considerations due to its handling of sensitive health data. The ACM Code of Ethics serves as a guiding framework here, emphasising imperatives like “contribute to society and to human well-being” ( Principle 1.1) and “avoid harm” (Principle 1.2), alongside professional responsibilities such as competence and honesty (ACM, 2018). In the context of capstone computing studies, understanding these principles is essential, as they inform how technologies like RPM devices can be developed and deployed responsibly. For instance, while the device offers benefits in reducing hospital visits, it must navigate risks related to data privacy and accuracy, which the ACM Code addresses through calls for integrity and respect for user autonomy. This overview sets the stage for delineating specific responsibilities, ensuring that ethical standards are not merely theoretical but practically applied in computing practice.
Responsibilities of the Technology Provider
Technology providers, typically companies or developers creating the RPM hardware and software, bear significant ethical duties under the ACM Code. Primarily, they must ensure the device’s design prioritises user safety and data security, adhering to Principle 2.1, which requires striving for high quality and minimising risks (ACM, 2018). This involves implementing robust encryption for data transmission to prevent breaches, as evidenced in studies on health informatics where insecure systems have led to privacy violations (Kuo, 2011). Providers are also responsible for transparency, informing users about data usage in line with Principle 1.4 on fairness and non-discrimination, particularly for vulnerable populations like elderly patients who may rely on RPM devices.
Furthermore, providers should engage in ongoing evaluation and updates to address emerging ethical issues, such as algorithmic biases in data analysis that could disproportionately affect certain demographics. Research from the Journal of Biomedical Informatics highlights how ethical lapses in device design can exacerbate health disparities, underscoring the need for providers to conduct impact assessments (Rajkomar et al., 2018). In a capstone computing perspective, this responsibility extends to collaborating with regulatory bodies, ensuring compliance with standards like those from the UK’s Medicines and Healthcare products Regulatory Agency (MHRA), to foster trust and societal benefit. Arguably, providers must also educate implementers on ethical usage, bridging the gap between development and application.
Responsibilities of the Technology Implementer
As the technology implementer—in this scenario, a computing student overseeing deployment in a capstone project—I hold responsibilities centred on ethical integration and oversight. The ACM Code’s Principle 2.2 mandates maintaining high professional standards, which for implementers means verifying the device’s compatibility with existing healthcare systems while mitigating potential harms (ACM, 2018). This includes conducting thorough testing to ensure data accuracy, as inaccuracies could lead to misdiagnoses, a concern raised in analyses of wearable health technologies (Piwek et al., 2016). Implementers must also prioritise user consent and privacy, aligning with Principle 1.7 on respecting privacy, by configuring systems to allow opt-in data sharing.
In practice, this role involves risk assessment, such as evaluating how RPM implementation might affect patient autonomy, and adapting the technology accordingly. For example, during deployment, implementers should document ethical decision-making processes, drawing on frameworks from computing ethics literature to justify choices (Floridi, 2013). From a student’s viewpoint in capstone computing, this fosters skill development in ethical problem-solving, where one might collaborate with healthcare stakeholders to address limitations like digital divides. Therefore, implementers act as ethical gatekeepers, ensuring the technology’s benefits outweigh risks through vigilant application.
Responsibilities of End Users
End users, including patients and healthcare professionals using the RPM device, have distinct yet crucial responsibilities under the ACM Code, particularly in contributing to ethical outcomes. Principle 3.1 encourages computing professionals (which can extend to informed users) to promote public understanding of technology, implying users should educate themselves on device functionalities to avoid misuse (ACM, 2018). Patients, for instance, are responsible for accurate data input and reporting anomalies, as improper usage could compromise health outcomes, a point supported by studies on user engagement in remote monitoring (Greenhalgh et al., 2017).
Healthcare professionals as users must uphold Principle 1.2 by avoiding harm, such as by verifying data before making clinical decisions and reporting ethical concerns like data inaccuracies. This shared responsibility model, as discussed in ethics-focused health technology research, emphasises users’ roles in feedback loops to improve systems (Topol, 2019). Generally, end users should respect data privacy norms, refraining from unauthorised sharing, which aligns with broader societal well-being. In the capstone computing context, recognising these duties highlights how user behaviour influences technology efficacy, promoting a holistic ethical ecosystem.
Consequences of Not Upholding Ethical and Professional Standards
Failing to adhere to ethical standards in RPM technology can lead to severe repercussions, affecting individuals and society. Breaches in data security, violating ACM Principle 1.7, might result in identity theft or unauthorised health data exposure, as seen in real-world incidents like the 2015 Anthem data breach, which compromised millions of records (Krebs, 2015). Such lapses could erode public trust in computing technologies, leading to reduced adoption of beneficial tools and exacerbating healthcare inequalities.
On a broader scale, unaddressed biases in device algorithms might perpetuate discrimination, contrary to Principle 1.4, potentially worsening outcomes for marginalised groups and inviting legal consequences under regulations like the UK’s Data Protection Act 2018 (UK Government, 2018). Professionally, providers and implementers risk reputational damage or sanctions from bodies like the ACM, while end users might face health risks from unreliable data. Indeed, these consequences underscore the ACM Code’s emphasis on harm avoidance, illustrating how ethical neglect in computing can cascade into societal harm.
Verifying Ethical Standards and Actions on Concerns
Technology implementers can verify adherence to ethical standards through systematic audits and stakeholder consultations. For RPM devices, this might involve using checklists based on the ACM Code to assess privacy measures, complemented by third-party reviews for objectivity (ACM, 2018). Tools like ethical impact assessments, as recommended in computing ethics guidelines, allow for ongoing monitoring (Floridi, 2013). Collaboration with ethics committees in healthcare settings further ensures compliance, providing a mechanism to evaluate real-world application.
If ethical concerns emerge, immediate action is required: implementers should document issues, halt problematic features if necessary, and report to providers or regulators, aligning with Principle 2.5 on whistleblowing (ACM, 2018). For instance, escalating data privacy risks to the Information Commissioner’s Office in the UK promotes accountability (ICO, 2023). This proactive approach, informed by capstone computing principles, mitigates harm and reinforces ethical integrity.
Conclusion
In summary, the ACM Code of Ethics provides a robust framework for delineating responsibilities in RPM technology, assigning providers the duty of safe design, implementers the role of ethical deployment, and end users the obligation of informed usage. The potential consequences of ethical failures, such as data breaches and societal distrust, highlight the need for vigilance, while verification methods like audits and decisive actions on concerns ensure standards are maintained. These insights, from a capstone computing perspective, emphasise the importance of ethics in technology implementation, ultimately contributing to societal well-being and professional advancement. By upholding these principles, stakeholders can harness RPM’s potential while minimising risks, fostering a more equitable digital health landscape.
References
- ACM (2018) ACM Code of Ethics and Professional Conduct. Association for Computing Machinery.
- Floridi, L. (2013) The Ethics of Information. Oxford University Press.
- Greenhalgh, T., et al. (2017) ‘Beyond adoption: a new framework for theorizing and evaluating nonadoption, abandonment, and challenges to the scale-up, spread, and sustainability of health and care technologies’, Journal of Medical Internet Research, 19(11), p. e367. Available at: https://www.jmir.org/2017/11/e367/.
- ICO (2023) Guide to Reporting Data Breaches. Information Commissioner’s Office.
- Krebs, B. (2015) Anthem Breach May Have Exposed 80 Million Customer Records. Krebs on Security.
- Kuo, A. (2011) ‘Opportunities and challenges of cloud computing to improve health care services’, Journal of Medical Internet Research, 13(3), p. e67. Available at: https://www.jmir.org/2011/3/e67/.
- Piwek, L., et al. (2016) ‘The rise of consumer health wearables: promises and barriers’, PLoS Medicine, 13(2), p. e1001953. Available at: https://journals.plos.org/plosmedicine/article?id=10.1371/journal.pmed.1001953.
- Rajkomar, A., et al. (2018) ‘Ensuring fairness in machine learning to advance health equity’, Annals of Internal Medicine, 169(12), pp. 866-872.
- Topol, E. (2019) Deep Medicine: How Artificial Intelligence Can Make Healthcare Human Again. Basic Books.
- UK Government (2018) Data Protection Act 2018. Legislation.gov.uk.

