Difference between revisions of "Mobile Health Implementation"
From Clinfowiki
(→Best Practices) |
(→Best Practices and Guidelines) |
||
Line 17: | Line 17: | ||
== Best Practices and Guidelines== | == Best Practices and Guidelines== | ||
white paper | white paper | ||
− | + | ||
− | + | The Journal of AHIMA has publish safeguards against loss or theft of your mobile device. These safeguards are: | |
+ | \startcolumns[n=2] | ||
+ | \input | ||
+ | |||
+ | * Never leaving it unattended. | ||
* To avoid someone mistakenly taking your device in a crowded area such as airport security checkpoints, identify your mobile device by affixing a business card or ID tag to it. | * To avoid someone mistakenly taking your device in a crowded area such as airport security checkpoints, identify your mobile device by affixing a business card or ID tag to it. | ||
* A high percentage of laptops are stolen from offices. Invest in a tether or cable lock to secure your laptop to something stationary such as airport seating or and office desk. | * A high percentage of laptops are stolen from offices. Invest in a tether or cable lock to secure your laptop to something stationary such as airport seating or and office desk. | ||
* Install office security cameras to deter over-confident thieves. | * Install office security cameras to deter over-confident thieves. | ||
+ | |||
+ | \stopcolumns | ||
+ | |||
+ | |||
Revision as of 18:17, 8 March 2012
Contents
Definitions
Security Risks
- assume built in security is not adequate which places the problem on the device itself.
- Fragmentation - diversity of mobile products in the marketplace
vendors lack experience with security measures across multiple mobile devices.
HIPAA Security Requirements
Best Practices and Guidelines
white paper
The Journal of AHIMA has publish safeguards against loss or theft of your mobile device. These safeguards are: \startcolumns[n=2] \input
- Never leaving it unattended.
- To avoid someone mistakenly taking your device in a crowded area such as airport security checkpoints, identify your mobile device by affixing a business card or ID tag to it.
- A high percentage of laptops are stolen from offices. Invest in a tether or cable lock to secure your laptop to something stationary such as airport seating or and office desk.
- Install office security cameras to deter over-confident thieves.
\stopcolumns
http://journal.ahima.org/2011/07/19/low-tech-security-risks-still-leading-cause-of-breaches/
Evaluating Mobile Technology
HIPAA Guidance Online Tech white paper
Mobility Trends in Healthcare
Aruba Networks, Inc conducted a survey...
Sources
References
http://mobihealthnews.com/10747/how-mobile-health-can-abide-by-hipaa/
http://www.arubanetworks.com/pdf/solutions/HIMSSSurvey_2012.pdf