Difference between revisions of "Mobile Health Implementation"
From Clinfowiki
(→Security Risks) |
|||
Line 3: | Line 3: | ||
== Security Risks == | == Security Risks == | ||
+ | |||
+ | |||
* assume built in security is not adequate which places the problem on the device itself. | * assume built in security is not adequate which places the problem on the device itself. | ||
Line 13: | Line 15: | ||
− | == Best Practices == | + | == Best Practices == white paper |
+ | |||
+ | == Evaluating Mobile Technology == white paper | ||
== Mobile Health Trends == | == Mobile Health Trends == | ||
+ | |||
+ | |||
+ | == Sources == | ||
+ | |||
+ | == References == | ||
+ | |||
+ | [http://www.nist.gov/nstic/] |
Revision as of 17:39, 8 March 2012
Contents
Definitions
Security Risks
- assume built in security is not adequate which places the problem on the device itself.
- Fragmentation - diversity of mobile products in the marketplace
vendors lack experience with security measures across multiple mobile devices.
HIPAA Security Requirements
== Best Practices == white paper
== Evaluating Mobile Technology == white paper