Difference between revisions of "Mobile Health Implementation"
From Clinfowiki
(→Security Risks) |
|||
Line 6: | Line 6: | ||
* assume built in security is not adequate which places the problem on the device itself. | * assume built in security is not adequate which places the problem on the device itself. | ||
− | * Fragmentation | + | * Fragmentation - diversity of mobile products in the marketplace |
− | vendors lack experience with security measures across multiple mobile | + | |
+ | vendors lack experience with security measures across multiple mobile devices. | ||
== HIPAA Security Requirements == | == HIPAA Security Requirements == |
Revision as of 17:31, 8 March 2012
Contents
Definitions
Security Risks
- assume built in security is not adequate which places the problem on the device itself.
- Fragmentation - diversity of mobile products in the marketplace
vendors lack experience with security measures across multiple mobile devices.