Difference between revisions of "Mobile Health Implementation"

From Clinfowiki
Jump to: navigation, search
(Security Risks)
Line 6: Line 6:
 
* assume built in security is not adequate which places the problem on the device itself.
 
* assume built in security is not adequate which places the problem on the device itself.
  
* Fragmentation  
+
* Fragmentation - diversity of mobile products in the marketplace
vendors lack experience with security measures across multiple mobile device platforms
+
 
 +
vendors lack experience with security measures across multiple mobile devices.
  
 
== HIPAA Security Requirements ==
 
== HIPAA Security Requirements ==

Revision as of 17:31, 8 March 2012

Definitions

Security Risks

  • assume built in security is not adequate which places the problem on the device itself.
  • Fragmentation - diversity of mobile products in the marketplace

vendors lack experience with security measures across multiple mobile devices.

HIPAA Security Requirements

Best Practices

Mobile Health Trends