Security Implications of BYOD in Health Care 23638 Optum post on Tuesday, November 29, 2016 | Categories: Privacy and Security, Privacy & Security Best Practices, HIPAA An Article from Optum This article from Optum provides a breakdown on Bring Your Own Device (BYOD) policy considerations based on the mix of devices your organization is trying to support, the size of your healthcare organization and implementation factors that may have an impact on success. From the article introduction: "Technology is reshaping how health care operates, requiring new approaches to information and cyber security. Advancements in mobile technologies provide physicians and nurses with new tools to deliver care and stay connected to patients outside of the four walls of a hospital or clinic. In addition to clinicians, administrators and patients are also demanding remote access to medical and financial records, often using their own devices. Mobile capabilities can enhance how clinicians deliver care, patients experience care, and administrators support operations. However, increased mobility, the Internet of Things (IoT), and bring your own device (BYOD) can also expose an organization to new vulnerabilities across the technology environment, especially at endpoints. Hospitals and health systems must be able to balance all end-user needs and expectations when adopting mobile, BYOD, and other digital capabilities. " Tags: HIPAA BYOD Policy Print Previous Article Mobile Device Security: Managing Cloud-based & Hybrid Solutions in Healthcare Settings Next Article Minor and Parental Access to Patient Portals Resource Links A link to the original article on Optum titled Security Implications of BYOD in Health Care Intended AudienceHealth IT Leadership, CIO Related Resources Keeping the Pediatric PHI Secure: Using the Security Risk Assessment Tool OCR COVID-19 Webinar Using non-traditional technology for telehealth during COVID-19 Pandemic Strategic Cybersecurity Breach Protection and Incident Response Health Center Defense Against the Dark Web Presentation Leave a comment Name: Please enter a name. Email: Please enter an email address. Please enter a valid email address. Comment: Please enter comment. I agree This form collects your name, email, IP address and content so that we can keep track of the comments placed on the website. For more info check our Privacy Policy and Terms Of Use where you will get more info on where, how and why we store your data. You must read and accept this rules. Add comment
Health Center Case Examples in Coding and Documenting Social Risks: Introduction Health Center Case Examples in Coding and Documenting Social Risks: Introduction Health Center Case Examples in Coding and Documenting Social Risks: Introduction
Health Center Case Examples in Coding and Documenting Social Risks Health Center Case Examples in Coding and Documenting Social Risks Health Center Case Examples in Coding and Documenting Social Risks
Health Center Case Examples in Coding and Documenting Social Risks Health Center Case Examples in Coding and Documenting Social Risks Health Center Case Examples in Coding and Documenting Social Risks