BYOD Nightmare. Perfect Storm of Mobile Devices and Application in Hospitals
|
|
- Leona Anderson
- 8 years ago
- Views:
Transcription
1 BYOD Nightmare Perfect Storm of Mobile Devices and Application in Hospitals Neha Patel, MD MS Director of Mobile Strategy and Applications Director of Quality, Section of Hospital Medicine University of Pennsylvania Health System
2 Agenda Case for mobile strategy in health care Considerations for BYOD in health care Mechanics of UPHS BYOD policy 2
3 3
4 Driving factors Mobile devices and apps are ubiquitous Rising demand from patients, providers, and partners for mobile medicine Vendors accept that mobile is inevitable App creation culture expanding at Penn 4
5 Role for mobile health in hospitals Workaround Culture in healthcare organizations Focus on current, immediate patient care needs rather than on improving system for future patients Fragmented methods of communication and workflow Vicious cycle: bad process workarounds bad process Tethered to desktop Pagers Secured Mobile Paperless handoff Paper handoff Keyhole views Closed loop Real time data 5
6 Adoption not a problem Medview mobile Cureatr Rolodoc (organic) Carelign iantibiogram 6
7 Cureatr: secure messaging Mobile, real-time communication for providers HIPAA-secure, Inter- & intra-organization text messaging Web App ios Android 7
8 Mobile Chart Review & Handoff Tool
9 PERFECT STORM 9
10 Penn Medicine current state (July 2015) The Good 4507 Corporate provided Smartphones Mobile Device Management (MDM) Device Encryption Passcode Required Remote Clean/Wipe when Stolen/Lost The Not so Bad 6843 MDM licenses for Smartphones 1387 MDM licenses for Tablets The Ugly Frontline staff are using personal Smartphones (fellows, residents, nurses) in clinical setting 10
11 Use cases of personal smartphones by clinicians Cellular Medical reference Tactically speaking, bring your own device (BYOD) is an unstoppable user driven force. Texting/Pictures 11
12 Healthcare institutions are addressing mobility 190 organizations (56% AMC) surveyed in respondents 57% indicated that their organization has a mobile technology policy in place Items included in a Mobile Technology Policy Percent Means of securing devices (i.e. storing information on device) 85% Use of personal devices for clinical/work use 7% Management of lost/stolen devices 86% Ability to access data from remote locations 72% Types of applications approved for use 49% Brand/version of device 36% 86% including in future work Source: 2015 HIMSS Mobile Technology Survey. 12
13 Penn Medicine mobile device strategy While we work through the development of a mobile device strategy, there is an immediate need to manage users across the organization who currently use personal devices to access Penn Med business and clinical applications. Develop policy Enable mobile productivity Configuration standards Manage mobile risk Locate lost/stolen devices Device encryption Control Penn Medicine data moved to mobile environment 13
14 Considerations of a Bring Your Own Device policy Privacy and security Financial considerations Stipends Reimbursement User categories Devices and level of support 14
15 Close the gap between perception and reality when it comes to privacy and information protection on mobile devices Balance information protection and privacy interests in your mobility programs Less Privacy Expectations Corporate Provided Joint Ownership Personal Phone More Privacy Expectations 15
16 16
17 Containerization Strengths Enables separation of business and personal applications and data so that a single device Helps an enterprise manage the risk of sensitive data exposure through authentication, encryption, selective wipe and data use controls Provides a common user experience across multiple devices Potential to reduce enterprise support costs for mobility Weaknesses User experience is not the same as native applications on the device UI still has a poor reputation Users do not like the process of switching between the container and the main user screen Do not support the complete separation of phone and texting functions on mobile devices Can provide a single sign on capability across multiple applications 17
18 Privacy and security addressed in Penn Medicine s BYOD policy We bear the burden of establishing our employees privacy expectations when it comes to mobile devices and so offer two options for BYOD users: 1. Current Mobile Device Manager (Default) 2. MDM Containerization (Opt in) Workspace on the device that is defined and managed by IS Device (Personal Apps and Data) App App App App Data Container (Business Apps and Data) App App App Data 18
19 Beware: personal information IS sacred Data that is monitored Who What Data that can be wiped Selective wipe 19
20 Trojan horse strategy for shifting costs to employees? Corporate issued How much will be spent on each device Cost of a fully subsidized data plan Cost of recycling devices every few years Warranty plans IT time and labor in managing the program BYOD Cost of a partially subsidized data plan Eliminates cost of the device purchase Cost of mobile device management 20
21 Models to finance BYOD Employee pays Employees are responsible for all costs related to operating the device they own. Company pays service plan Company reimburses employee Company pays all operational costs associated with the employee owned device. Allows the enterprise to aggregate voice minutes and data usage, which often allows the enterprise to negotiate lower overall rates Requires regular payments to an employee that are designed to offset the cost of service plans and other operational investments May be considered taxable revenue Employee reimburses company Company makes the payments for the service plan and other costs and deducts them from an employees pay 21
22 Financing BYOD from the employer side Stipend: a fixed sum paid periodically (usually monthly) to defray a specific expenses; it is usually added on to an employee s regular pay as a gross up on their paycheck Reimbursement: a payment to the employee for a business expenses, typically after the expenses has been incurred and in response to the employee filing an expense report. Allowance: a fixed amount of money allocated on a periodic basis (often per year) for an employee to spend on specified goods or services related to his or her job. Advantage Disadvantage Fixed Payment (Stipend or Allowance) Low process overhead (just add to paycheck) No action is required on the user s part to initiate the payment Payroll tax implications for the organization Tax implications for the users (potential for income, social security, Medicare, and state taxes) Reimbursement Provides the user a chance to substantiate the expense Avoid taxes on reimbursement Increased process overhead for organization Administrated work for user (required to submit a bill) 22
23 Pay up: Is the free ride over for Corporate BYOD? 23
24 24
25 User categories for UPHS BYOD policy The BYOD program is intended to be voluntary for exempt employees. Incentive to enroll will be access to apps that add value to workflow Eligibility for participation in the BYOD Program will be assessed by the user s department manager. There is a justifiable business requirement for having mobile access to Penn Medicine information The user has elected to use his/her own device Human Resources approval is required before a nonexempt employee may participate in the BYOD Program 25
26 BYOD Initiatives Take on a variety of different approaches We are here INFORMAL Users can access apps and data from their personal device FORMAL BYOD policy, stipend, selfservice web site and support 26
27 Barriers to use of mobile technology Lack of Funding Limited Incentives for Use Immaturity of Vendors Lack of Standards/Interoperability Lack of IT Staff Inadequate Privacy/Security Lack of Staff Expertise Challenges Regarding Wireless Capabilities Lack of Executive Support Clinician Resistance to Technology Doesn't Fit in Workflow 13% 36% 32% 32% 32% 29% 27% 24% 22% 20% 51% N = 231 Source: 2015 HIMSS Mobile Technology Survey 27
28 Penn Medicine mhealth Governance focus Smartphones >> Tablets Corporate-BYOD Policy setting (security, eligibility) Infrastructure & Support Financial implications Mobile Devices Mobile Applications Functionalities Secured messaging Directory/schedules Workflow Resources Software Architecture Native vs Web App 28
29 Apps will change care delivery Courtesy of Glenn Steele, CEO of Geisinger EHR World Today The Future Benefits Data dispersed, not easily found, Useless Copy and Paste Workflows not efficient or userfriendly Minimum analytically supported clinical decision support Data extracted, reorganized and presented in a userfriendly way Workflow facilitated via clinical logic; results of analyses integrated into workflow Decision support based on analysis of data outside and inside of EHR Saves clinician time Improves quality of care Easier and less expensive to employ Difficult to implement changes Easy to program changes Increase coding scores and documentation requirements
30 Considerations of leveraging mobility in healthcare Design for today but need to anticipate tomorrow Develop and invest in existing talent (PI specialists, clinicians, designers) Incremental build start with an idea/prototype and get it into hands of frontline providers Build vs buy decisions Lack of scientific evidence to measure the efficacy of mobile apps Measure what we can, but not what counts Develop evaluation criteria focused on business cases and patient care benefits EMR integration To do or not to do Accept timeline of vendors? Partnership between Clinicians and IS 30
31 Join us 31
3 rd Annual HIMSS Analytics Mobile Survey. February 26, 2014. www.himssanalytics.org
3 rd Annual HIMSS Analytics Mobile Survey February 26, 2014 www.himssanalytics.org 2013 HIMSS Analytics Mobile Technology Survey Final Report February 26, 2014 For the first time in 2011, HIMSS explored
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationLeveraging Technology to Power Transformation in Today's Healthcare Environment
Leveraging Technology to Power Transformation in Today's Healthcare Environment Healthcare executives, staff and clinicians consistently say they are both surprised and impressed at how new technology
More informationFrequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
More informationA CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
More informationBYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
More informationSession 125: A Health IT Executive s Guide To BYOD Management
Session 125: A Health IT Executive s Guide To BYOD Management Ken Congdon, Editor In Chief, Healthcare Technology Online (DISCLAIMER: The views and opinions expressed in this presentation are those of
More informationArchitecture of Enterprise Mobile Apps
Architecture of Enterprise Mobile Apps November 22, 2011 Sergey Zabaluev http://mobile.ctco.eu Setting the context Business trends need for speed and agility Highly competitive, global marketplace Increasing
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationThou Shalt Allow BYOD
Thou Shalt Allow BYOD The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It s as if a voice boomed down from the mountain ordering all of
More informationThou Shalt Allow BYOD
Thou Shalt Allow BYOD The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It s as if a voice boomed down from the mountain ordering all of
More informationBYOD Strategies: Chapter I
Building Bring-Your-Own-Device (BYOD) Strategies This is the first part in a series designed to help organizations develop their BYOD (bring-your-own-device) strategies for personally-owned smartphones
More informationHands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl
More informationUNIVERSITY OF NEBRASKA - LINCOLN CELLULAR PHONE USEAGE FAQ
UNIVERSITY OF NEBRASKA - LINCOLN CELLULAR PHONE USEAGE FAQ Why has this policy changed? The Department of the Treasury, through its Internal Revenue Service, issued new guidelines that clarified the taxability
More informationBYOD STRATEGIES: THE COST BYOD. The. Can BYOD. decrease. mobility costs?
BYOD STRATEGIES: THE COST I M P L I C AT I O N S O F BYOD The Can BYOD decrease mobility costs? Introducing BYOD BYOD offers the potential for employers to increase both productivity and employee satisfaction
More informationEnterprise on the Go. How enterprises can leverage mobile apps
Enterprise on the Go How enterprises can leverage mobile apps Vivek Narasimhan June 2012 Contents I. Project Scope II. Consumerization of IT drives demand for apps III. Enterprise App Considerations IV.
More informationTaking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia
Taking Charge with Apps, Policy, Security and More October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia http://pinterest.com/visualoop/byod-infographics/ vs. NSFW PSFW NSFW Security & Compliance
More informationSeparation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices
Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception
More informationHow To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
More informationMANAGING ENTERPRISE WIRELESS SERVICES TO MAXIMUM ADVANTAGE
MANAGING ENTERPRISE WIRELESS SERVICES TO MAXIMUM ADVANTAGE Written by: Kevin DiLallo, Levine, Blaszak, Block and Boothby LLP and Ben Fox, TechCaliber Consulting, LLC August 2015 MANAGING ENTERPRISE WIRELESS
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationThe Bring Your Own Device Era:
The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era
More informationAchieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert
Achieving Multi-Platform Support in the BYOD Era Presented by: Kaushik Srinivas and Josh Lambert Agenda Impact of mobile within the workplace Key bring your own device (BYOD) platforms Future trends in
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationFeaturing industry research by. Produced by
Featuring industry research by Produced by With the ubiquity of personal electronic devices, healthcare workers are all too commonly performing workarounds alternatives to approved workflows that bypass
More informationNandan Banerjee Cogent Infotech Corporation COGENT INFOTECH CORPORATION
Nandan Banerjee Cogent Infotech Corporation Health Care Cost Better, Efficient, Valuable Health care services Stakeholders demand for metrics across clinical, operational and financial disciplines. Overcoming
More informationBest Practices for Implementing an EHR System
Best Practices for Implementing an EHR System Robyn Leone Director, CO-REC rleone@corhio.org The Case for EHRs Healthcare spending as a percent of our Gross Domestic Product (GDP) at unprecedented high
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationperspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
More informationA Guide to Choosing the Right EMR Software. A Guide to Choosing the Right EMR Software
A Guide to Choosing the Right EMR Software A Guide to Choosing the Right EMR Software Eight Important Benchmarks for Community and Critical Access Hospitals Eight Important Benchmarks for Community and
More informationCompliance Management for Mobile Devices
Compliance Management for Mobile Devices MOBILE SOLUTIONS Agenda Mobile Device Use Today Mobile Device Use Tomorrow Mobile Device Configuration Challenges in the Mobile Device Environment Policy and Configuration
More informationThe BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014
The BYOD of Tomorrow: BYOD 2.0 Cesar Picasso, MBA SOTI Inc. April 02, 2014 What is BYOD 1.0? BYOD 1.0 was the first wave of mobile device management that controlled the entire device BYOD 1.0 was inadequate
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationSecuring Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
More informationMobile Applications in Community-Based Mental Health: The Time is Now
Mobile Applications in Community-Based Mental Health: The Time is Now 1 Executive Summary Behavioral health providers face increasing challenges to support larger caseloads and productivity goals, regulatory
More informationSOLUTION BRIEF June 2014. How do you capitalize on mobility opportunities in healthcare, both today and in the long term?
SOLUTION BRIEF June 2014 How do you capitalize on mobility opportunities in healthcare, both today and in the long term? SOLUTION BRIEF While bring your own device (BYOD) and physician texting are hot
More informationManaging Mobility in the BYOD Era:
Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in
More informationWireless Communication Device Allowance
Wireless Communication Device Allowance Policy Type: Administrative Responsible Office: Vice President for Finance and Administration Initial Policy Approved: 04/05/2012 Current Revision Approved: 12/11/2014
More informationPolicies Covering Mobile Phones
Policies Covering Mobile Phones MAPI Council Survey January 2012 No. 215 By: Don Norman Council Director and Economist danorman@mapi.net Assisted By: Jun Lee Research Associate Manufacturers Alliance for
More informationENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM
ENTERPRISE BYOD BEST PRACTICES 1 ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM BYOD, Bring Your Own Device, is a rapidly growing trend in which
More informationAdvisors, Inc. Q 6. An Employee Benefits Capabilities Presentation. Q 6 Advisors, Inc.
Q 6 Advisors, Inc. An Employee Benefits Capabilities Presentation Q 6 Advisors, Inc. Q 6 Advisors, Inc. Strategic Guidance for Intelligent Decisions 333 Earle Ovington Blvd., Suite 402 Uniondale, NY 11553
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More informationMobile Computing in Healthcare: Privacy and Security Considerations and Available Resources
Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources NIST/OCR Conference June 6, 2012 Speaker Lisa A. Gallagher, BSEE, CISM, CPHIMS Senior Director, Privacy and Security
More informationThis procedures memorandum systematizes the use of mobile communications devices such as cell phones for College business.
OTHER TOPICS Index No. X-13 PROCEDURES MEMORANDUM TO: FROM: SUBJECT: MCC Staff Office of the President Cell Phones DATE: September 3, 2014 PURPOSE: SCOPE: This procedures memorandum systematizes the use
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationMobile Device and Application Strategy. Right Technology, Right Design, Right Price
Mobile Device and Application Strategy Right Technology, Right Design, Right Price Agenda 1 Mobility Strategy Methodology 2 3 Mobile Device Strategy Mobile Application Development 4 Q &A Mobility Strategy
More informationA Radicati Group Web Event
The Radicati Group, Inc. www.radicati.com A Radicati Group Web Event ** Please dial-in by phone to listen to the audio portion of this event. The dial-in number is in your registration confirmation email
More informationBYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS
BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile
More informationHow Technology Executives are Managing the Shift to BYOD
A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the
More informationYes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
More informationMobile Device Security Is there an app for that?
Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationThe Holistic Guide to BYOD in Your Business Jazib Frahim
The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationMDM Mobile Device Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationGOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
More informationIL-HITREC P.O. Box 755 Sycamore, IL 60178 Phone 815-753-1136 Fax 815-753-2460 email info@ilhitrec.org www.ilhitrec.org
IL-HITREC P.O. Box 755 Sycamore, IL 60178 Phone 815-753-1136 Fax 815-753-2460 email info@ilhitrec.org www.ilhitrec.org INTRODUCTION BENEFITS CHALLENGES WHY NOW? HOW WE HELP SUMMARY Better patient care
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationBetter patient care and better practice management
www.hitecla.org INTRODUCTION BENEFITS CHALLENGES WHY NOW? INCENTIVES FOR PROVIDERS HOW WE HELP SUMMARY Better patient care and better practice management Using Electronic Health Records in a meaningful
More informationSichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce
Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013
More information03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement
Bring Your Own Device: A Framework for Audit Emily A Knopp, CPA, CISA Audit Director Angelo State University, Member of Texas Tech University System March 6, 2014 Texas Association of College of University
More informationBring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com
Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com ipad in the News More and more ipads will find their way into the workplace in
More informationMINISTRY OF HEALTH ELECTRONIC MEDICAL RECORDS
MINISTRY OF HEALTH ELECTRONIC MEDICAL RECORDS MEXICO CITY November 10, 2010 OVERVIEW Why Electronic Medical Records (EMR)? Planning, Implementation & Challenges Observed Outcomes Valuable Lessons 1 EMR
More informationSecuring data on mobile devices without compromising the user experience
Securing data on mobile devices without compromising the user experience Mobile Workspaces Mobile users need access to businessgrade apps and company data from any device. Desktops Apps Data Collaboration
More informationMobile Computing in Healthcare: Privacy and Security Considerations and Available Resources
Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources HOA Mobility Conference Sept 27, 2012 Speaker Lisa A. Gallagher, BSEE, CISM, CPHIMS Senior Director, Privacy
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationA Mobile Architecture, Not Just a Mobile App
A Mobile Architecture, Not Just a Mobile App Gary Audin Delphi, Inc. May 2013 CONTENTS 2 Meeting the Mobility Challenge 2 The Impact of BYOD 3 What to Gain with Mobile Communications 4 The Right Mobile
More informationDell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX Introducing Dell Enterprise Mobility Management Brandon Herrin and Jason Moody Agenda Mobility/BYOD needs across the workforce Introducing Dell
More information#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s
#mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA BYOD Agenda What is BYOD? Why BYOD? Challenges
More informationEnabling the Mobile Enterprise: Don t fight it. Feature it.
EOH CIO CIO Connect Connect White Paper White Enabling the Paper Mobile Enterprise Enabling the Mobile Enterprise: Don t fight it. Feature it. By Alex Russell, EOH The Bring Your Own Device (BYOD) trend
More informationThe. C s. of Mobile Device. Management
The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile Device Management
More information50 shades of Siebel mobile
50 shades of Siebel mobile Markus Schneeweis ec4u expert consulting AG 1 Agenda Start Part 1 The disruption Part 2 What means mobile? Part 3 Siebel Mobile clash of the generations? Part 4 Our offer 7 Key
More informationMobile Device Usage and Agreement Policy
Page 1 of 10 1.0 Introduction Mobile Device Usage and Agreement Policy The State of Minnesota provides several electronic tools for employees whose job performance requires or would be enhanced by their
More informationMobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
More informationDECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY
GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationPARTNER LOGO. The. C s. Mobile Device Management
PARTNER LOGO The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile
More informationEffectively Managing EHR Projects: Guidelines for Successful Implementation
Phoenix Health Systems Effectively Managing EHR Projects: Guidelines for Successful Implementation Introduction Effectively managing any EHR (Electronic Health Record) implementation can be challenging.
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationSAP BPC Forecasting: Anywhere, Anytime with Mobile Apps
September 9 11, 2013 Anaheim, California SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps Susan Beyer NTT DATA, Inc. Agenda What is the whole buzz about Mobility? How to expand your BPC footprint
More informationBYOD: The Threats and the Opportunity for Carriers
BYOD: The Threats and the Opportunity for Carriers Adrian Drury, Practice Leader, Consumer Impact Technology adrian.drury@ovum.com Richard Absalom, Analyst, Consumer Impact Technology richard.absalom@ovum.com
More informationMobilize your Enterprise in 60 Minutes!
Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationTechnology in Health Care A changing landscape presented by: Rick Casteel Vice President, Information Technology Upper Chesapeake Health
Technology in Health Care A changing landscape presented by: Rick Casteel Vice President, Information Technology Upper Chesapeake Health Rick Casteel Graduated from Havre de Grace High Graduated from Harford
More informationGartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
More informationMOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM
MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM PREPARED BY DANIEL MAYCOCK AND FRED CLARKE SLALOM CONSULTING INTRODUCTION The use of mobile devices in enterprises is
More informationSimplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3
Simplifying Mobility Management WhitePaper VERAMARK 2013 TEM SERIES, #3 Simplifying Mobility Management New solutions for the wireless world If you don t already have a mobility management strategy in
More informationManaging Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense
SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device
More informationEnterprise Analytics Strategic Planning
Enterprise Analytics Strategic Planning June 5, 2013 1 "The first question a data driven organization needs to ask itself is not "what do we think?" but rather "what do we know? Big Data: The Management
More informationThe HITECH Act: A Grand Experiment In HIT Implementation and Sustainability. Kim Dunn, MD, Ph.D.
The HITECH Act: A Grand Experiment In HIT Implementation and Sustainability August 11, 2011 Kim Dunn, MD, Ph.D. Agenda Historical Context for Reform Overview of ARRA Funded Programs Implications for Texas
More informationBYOD Policy Implementation Guide. February 2016 March 2016
BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...
More information