Fact Based List:

13 Security Tips to Combat Mobile Device Threats to Healthcare

Submitted by Marshall Riddle on Thu, 06/14/2012 - 13:42

  1. Install USB locks on computers, laptops or other devices that may contain PHI or sensitive information, to prevent unauthorized data transfer through. Christina Thielst, Tower Consulting Group
  2. Consider geolocation tracking software or services for mobile devices. Rick Kam, CIPP, ID Experts
  3. Brick the mobile device when it is lost or stolen. Jon A. Neiditz, Nelson Mullins Riley & Scarborough LLP
  4. Encrypt. Chris Apgar, CISSP, Apgar and Associates, LLC
  5. Laptops put in "sleep" mode, as opposed to shutting them down completely, can render encryption products ineffective. Winston Krone, Kivu Consulting
  6. Recognize that members of the workforce may use personal mobile devices to handle protected health information, even if contrary to policy. Adam H. Greene, Davis Wright Tremaine LLP
  7. Don't permit access to PHI by mobile devices w/out strong technical safeguards. Kelly Hagan, Schwabe, Williamson & Wyatt
  8. Educate employees about the importance of safeguarding their mobile devices. Dr. Larry Ponemon, Ponemon Institute
  9. Implement Electronic Protected Health Information (EPHI) security. Christine Marciano,Cyber Data Risk Managers LLC
  10. Healthcare orgs should get ahead 'of the BYOD upgrade' curve by ensuring that devices coming offline are adequately secured & checked before disposal/donation. Richard Santalesa, Information Law Group
  11. Have a proactive data management strategy. Chad Boeckman, Secure Digital Solutions, LLC
  12. ransparency and End User Consent Opt-In. David Allen, Locaid Technologies
  13. The mobile web and "app" landscape is not your father's Internet. Pam Dixon, World Privacy Forum

Source: ID Experts
Source URL: http://www2.idexpertscorp.com/resources/BestPracticesCheckli...

List Ratings:   
No votes yet
Your rating: None

Lists You Might Also Be Interested In

Login or register to post comments