Keeping Your Healthcare Data Under Wraps

With the advent of tablets, smartphones and the applications dedicated to streamlining healthcare, PHI (protected healthcare data) is increasingly at risk. According to the Department of Homeland Security healthcare organizations, providers and entities charged with safeguarding PHI under Federal HITECH and HIPAA are especially vulnerable.

Patient data is more moveable and is now processed and shared via personal devices and portable storage devices such as flash drives. The Bring Your Own Device (or BYOD) trend of data storage can be especially detrimental to a healthcare organization when these devices are lost or stolen. Thirteen experts representing legal, data breach prevention, technology, healthcare, IT and security were asked for their top tips to protect sensitive patient data and avoid disaster.

Keeping patient information secure can be a challenge.

1. Install USB locks on computers, laptops or other devices that may contain PHI or sensitive information, to prevent unauthorized data transfer (uploads or downloads) through USB ports and thumb drives. – Christina Thielst, FACHE, vice president, Tower Consulting Group.
2. Consider geolocation tracking software or services for mobile devices. – Rick Kam, CIPP, president and co-founder, ID Experts.

3. Brick the mobile device when it is lost or stolen. – Jon A. Neiditz, partner, Nelson Mullins Riley & Scarborough.

4. Encrypt. – Chris Apgar, CISSP, president and CEO, Apgar and Associates.

5. Laptops put in “sleep” mode, as opposed to shutting them down completely, can render encryption products ineffective. – Winston Krone, managing director, Kivu Consulting.

6. Recognize that members of the workforce may use personal mobile devices to handle protected health information, even if contrary to policy. – Adam H. Greene, partner, Davis Wright Tremaine.

7. Don’t permit access to PHI by mobile devices without strong technical safeguards: encryption, data segmentation, remote data erasure and access controls, VPN software, etc. – Kelly Hagan, attorney, Schwabe, Williamson & Wyatt.

8. Educate employees about the importance of safeguarding their mobile devices. – Dr. Larry Ponemon, chairman and founder, Ponemon Institute.

9. Implement Electronic Protected Health Information (EPHI) security. – Christine Marciano, president, Cyber Data Risk Managers.

10. Healthcare organizations should work to get ahead “of the BYOD upgrade” curve by ensuring that the devices coming offline are adequately secured and checked before disposal or donation. -Richard Santalesa, senior counsel, Information Law Group.

11. Have a proactive data management strategy. – Chad Boeckman, president, Secure Digital Solutions.

12. Transparency and End User Consent Opt-In. – David Allen, CTO, Locaid Technologies.

13. The mobile web and “app” landscape is not your father’s Internet. – Pam Dixon, executive director, World Privacy Forum.

If your healthcare facility or small business would like to learn more about how to protect your company’s data in the day of BYOD DataComm Plus can help set up your data security system and advise you on how to protect your information as well as your employees from date breaches. It’s your info-you should keep it.

 

 

Source: PR Newswire, ID Experts 

Related Posts
A Beginner’s Guide to Cloud Storage
Whether at home, in the office, or traveling, it’s important to have have complete control and access to your data. Cloud storage gives you just that— remote access to your ...
READ MORE
Mondopad: Touchscreen Meets The Bigscreen
iPads are cool. Androids are cool. Skype is cool and so is Go To Meeting. But add them all together, mix in your co-workers and some free food and you ...
READ MORE
5 Apps that Boost Office Productivity
Mobile apps have revolutionized the way we work and communicate, enabling us to transfer information at any time and any place. Devices like iPhones, iPads, and MacBooks are making it ...
READ MORE
Video Surveillance: Keeping Your Business Safe
Video surveillance can be an important asset in keeping your employees, customers and assets safe. Look over the benefits we’ve outlined below to find out if surveillance could be the ...
READ MORE
The Advantages Of VOIP
Does your company VOIP? No, it’s not a new internet craze. Well, actually it is an internet craze. VOIP an internet-based communications system that’s quickly becoming the choice for small ...
READ MORE
Forgotten Gun Found In School Bathroom
Yes, you read that correctly. A security guard, who was busy picking up cafeteria money, accidentally left a .38 revolver laying in the teachers restroom. This is an inexcusable lack ...
READ MORE
Are summer hours bad for your company?
Company summer hours policies have long been in place to keep the summer doldrums at bay for employees. And while employees say that having summer hours would increase their productivity there are ...
READ MORE
Benefits of Utilizing IP Security Cameras in School Systems
With bullying and violence a reality in schools across the nation, the idea of using IP security cameras in schools doesn't seem as far-fetched as it once might have. IP ...
READ MORE
Rethinking Your Approach to Business Security Systems
Rather than have one all-encompassing business security system in place, it is important to consider having a network of small security systems, geared around various components of your business. Different ...
READ MORE
Excessive texting may cause multiple physical problems.
If you’ve ever sat in a café and just people watched you’ve probably noticed a lot of people with their heads bent over a smartphone, furiously texting, tweeting, updating or ...
READ MORE
A Beginner’s Guide to Cloud Storage
Mondopad: Touchscreen Meets The Bigscreen
5 Apps that Boost Office Productivity
Video Surveillance: Keeping Your Business Safe
The Advantages Of VOIP
Forgotten Gun Found In School Bathroom
Are Summers Hours A Good Idea?
Benefits of Utilizing IP Security Cameras in School
Rethinking Your Approach to Business Security Systems
Are Your Gadgets Causing Health Problems?

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *