Mobile Health Implementation

From Clinfowiki
Revision as of 20:59, 8 March 2012 by Kerius (Talk | contribs)

Jump to: navigation, search

Definitions

Security Risks

With mobile devices getting smaller and smaller and with more clinicians using them both within and outside their workplace, the risk of loss or theft looms large over the healthcare environment. Afterall, theft or loss of mobile devices leads the list of health information breaches found at the Department of Health and Human Services website.


black market price of identity


  • assume built in security is not adequate which places the problem on the device itself.
  • Fragmentation - diversity of mobile products in the marketplace

vendors lack experience with security measures across multiple mobile devices.

HIPAA Security Requirements

Policy Considerations

Triage Clerical overhead Categorization and redirection Selective access to providers Archiving and backup Forbidden toics Selective confidentiality Encryption


Security Measures

Because of the proliferation and variety of mobile devices being used in the healthcare industry, it is that much more important to understand the precautions that must be in place in order to comply with the standards required by HIPAA.

HIPAA Guidance - HIPAA Security Guidance for Remote Use of and Access to Electronic Protected Health Information http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/remoteuse.pdf


white paper

The Journal of AHIMA has publish safeguards against loss or theft of your mobile device. These safeguards include:

  • Never leaving mobile devices unattended.
  • Identify your mobile device by affixing a business card or ID tag to it
  • Invest in a tether or cable lock to secure your laptop to something stationary such as airport seating or and office desk
  • Install office security cameras to deter over-confident thieves
  • Minimize the amount of sensitive information on the device
  • Protect USB storage devices with passwords
  • Disable USB ports
  • Turn off wireless file transfer capabilities
  • Password protect the BIOS to prevent disk access through changing the BIOS configuration
  • Create a user account password and remove guest accounts
  • Require manual log on for VPN connection
  • Invest in tracking software
  • Encrypt the file system
  • Use a firewall when accessing public/private networks

Yale University also has Protected Health Information (PHI) Security Compliance policies. They are :

  • Implement a lock-out setting after more than 10 failed attempts
  • Cap message storage at 200 or 14 days of messages
  • Require all applications to meet HIPAA security standards
  • Keep the operating system and all software current with latest security updates
  • Subscribe to a remote deletion service
  • Prohibit use of unauthorized software and hardware
  • Require VPN services when connecting to organization network via digital cellular
  • When transferring files, only allow secure file transfer protocol (SFTP)
  • Only store protected health information (PHI) on IT department-owned servers
  • Install and use privacy filters if screens display PHI
  • Securely destroy or delete PHI when upgrading or disposing of mobile devices
  • Disable emails auto-forwarding feature

Evaluating Mobile Technology

Online Tech white paper

Mobility Trends in Healthcare

Aruba Networks, Inc conducted a survey...

Sources

References

http://www.nist.gov/nstic/


http://mobihealthnews.com/10747/how-mobile-health-can-abide-by-hipaa/


http://www.arubanetworks.com/pdf/solutions/HIMSSSurvey_2012.pdf

https://www.ahimastore.org/ProductDetailBooks.aspx?ProductID=14383