Difference between revisions of "Mobile Health Implementation"

From Clinfowiki
Jump to: navigation, search
(Security Risks)
Line 3: Line 3:
  
 
== Security Risks ==
 
== Security Risks ==
 +
 +
  
 
* assume built in security is not adequate which places the problem on the device itself.
 
* assume built in security is not adequate which places the problem on the device itself.
Line 13: Line 15:
  
  
== Best Practices ==
+
== Best Practices == white paper
  
 +
 +
== Evaluating Mobile Technology == white paper
  
  
 
== Mobile Health Trends ==
 
== Mobile Health Trends ==
 +
 +
 +
== Sources ==
 +
 +
== References ==
 +
 +
[http://www.nist.gov/nstic/]

Revision as of 17:39, 8 March 2012

Definitions

Security Risks

  • assume built in security is not adequate which places the problem on the device itself.
  • Fragmentation - diversity of mobile products in the marketplace

vendors lack experience with security measures across multiple mobile devices.

HIPAA Security Requirements

== Best Practices == white paper


== Evaluating Mobile Technology == white paper


Mobile Health Trends

Sources

References

[1]