BYOD Nightmare. Perfect Storm of Mobile Devices and Application in Hospitals

Size: px
Start display at page:

Download "BYOD Nightmare. Perfect Storm of Mobile Devices and Application in Hospitals"

Transcription

1 BYOD Nightmare Perfect Storm of Mobile Devices and Application in Hospitals Neha Patel, MD MS Director of Mobile Strategy and Applications Director of Quality, Section of Hospital Medicine University of Pennsylvania Health System

2 Agenda Case for mobile strategy in health care Considerations for BYOD in health care Mechanics of UPHS BYOD policy 2

3 3

4 Driving factors Mobile devices and apps are ubiquitous Rising demand from patients, providers, and partners for mobile medicine Vendors accept that mobile is inevitable App creation culture expanding at Penn 4

5 Role for mobile health in hospitals Workaround Culture in healthcare organizations Focus on current, immediate patient care needs rather than on improving system for future patients Fragmented methods of communication and workflow Vicious cycle: bad process workarounds bad process Tethered to desktop Pagers Secured Mobile Paperless handoff Paper handoff Keyhole views Closed loop Real time data 5

6 Adoption not a problem Medview mobile Cureatr Rolodoc (organic) Carelign iantibiogram 6

7 Cureatr: secure messaging Mobile, real-time communication for providers HIPAA-secure, Inter- & intra-organization text messaging Web App ios Android 7

8 Mobile Chart Review & Handoff Tool

9 PERFECT STORM 9

10 Penn Medicine current state (July 2015) The Good 4507 Corporate provided Smartphones Mobile Device Management (MDM) Device Encryption Passcode Required Remote Clean/Wipe when Stolen/Lost The Not so Bad 6843 MDM licenses for Smartphones 1387 MDM licenses for Tablets The Ugly Frontline staff are using personal Smartphones (fellows, residents, nurses) in clinical setting 10

11 Use cases of personal smartphones by clinicians Cellular Medical reference Tactically speaking, bring your own device (BYOD) is an unstoppable user driven force. Texting/Pictures 11

12 Healthcare institutions are addressing mobility 190 organizations (56% AMC) surveyed in respondents 57% indicated that their organization has a mobile technology policy in place Items included in a Mobile Technology Policy Percent Means of securing devices (i.e. storing information on device) 85% Use of personal devices for clinical/work use 7% Management of lost/stolen devices 86% Ability to access data from remote locations 72% Types of applications approved for use 49% Brand/version of device 36% 86% including in future work Source: 2015 HIMSS Mobile Technology Survey. 12

13 Penn Medicine mobile device strategy While we work through the development of a mobile device strategy, there is an immediate need to manage users across the organization who currently use personal devices to access Penn Med business and clinical applications. Develop policy Enable mobile productivity Configuration standards Manage mobile risk Locate lost/stolen devices Device encryption Control Penn Medicine data moved to mobile environment 13

14 Considerations of a Bring Your Own Device policy Privacy and security Financial considerations Stipends Reimbursement User categories Devices and level of support 14

15 Close the gap between perception and reality when it comes to privacy and information protection on mobile devices Balance information protection and privacy interests in your mobility programs Less Privacy Expectations Corporate Provided Joint Ownership Personal Phone More Privacy Expectations 15

16 16

17 Containerization Strengths Enables separation of business and personal applications and data so that a single device Helps an enterprise manage the risk of sensitive data exposure through authentication, encryption, selective wipe and data use controls Provides a common user experience across multiple devices Potential to reduce enterprise support costs for mobility Weaknesses User experience is not the same as native applications on the device UI still has a poor reputation Users do not like the process of switching between the container and the main user screen Do not support the complete separation of phone and texting functions on mobile devices Can provide a single sign on capability across multiple applications 17

18 Privacy and security addressed in Penn Medicine s BYOD policy We bear the burden of establishing our employees privacy expectations when it comes to mobile devices and so offer two options for BYOD users: 1. Current Mobile Device Manager (Default) 2. MDM Containerization (Opt in) Workspace on the device that is defined and managed by IS Device (Personal Apps and Data) App App App App Data Container (Business Apps and Data) App App App Data 18

19 Beware: personal information IS sacred Data that is monitored Who What Data that can be wiped Selective wipe 19

20 Trojan horse strategy for shifting costs to employees? Corporate issued How much will be spent on each device Cost of a fully subsidized data plan Cost of recycling devices every few years Warranty plans IT time and labor in managing the program BYOD Cost of a partially subsidized data plan Eliminates cost of the device purchase Cost of mobile device management 20

21 Models to finance BYOD Employee pays Employees are responsible for all costs related to operating the device they own. Company pays service plan Company reimburses employee Company pays all operational costs associated with the employee owned device. Allows the enterprise to aggregate voice minutes and data usage, which often allows the enterprise to negotiate lower overall rates Requires regular payments to an employee that are designed to offset the cost of service plans and other operational investments May be considered taxable revenue Employee reimburses company Company makes the payments for the service plan and other costs and deducts them from an employees pay 21

22 Financing BYOD from the employer side Stipend: a fixed sum paid periodically (usually monthly) to defray a specific expenses; it is usually added on to an employee s regular pay as a gross up on their paycheck Reimbursement: a payment to the employee for a business expenses, typically after the expenses has been incurred and in response to the employee filing an expense report. Allowance: a fixed amount of money allocated on a periodic basis (often per year) for an employee to spend on specified goods or services related to his or her job. Advantage Disadvantage Fixed Payment (Stipend or Allowance) Low process overhead (just add to paycheck) No action is required on the user s part to initiate the payment Payroll tax implications for the organization Tax implications for the users (potential for income, social security, Medicare, and state taxes) Reimbursement Provides the user a chance to substantiate the expense Avoid taxes on reimbursement Increased process overhead for organization Administrated work for user (required to submit a bill) 22

23 Pay up: Is the free ride over for Corporate BYOD? 23

24 24

25 User categories for UPHS BYOD policy The BYOD program is intended to be voluntary for exempt employees. Incentive to enroll will be access to apps that add value to workflow Eligibility for participation in the BYOD Program will be assessed by the user s department manager. There is a justifiable business requirement for having mobile access to Penn Medicine information The user has elected to use his/her own device Human Resources approval is required before a nonexempt employee may participate in the BYOD Program 25

26 BYOD Initiatives Take on a variety of different approaches We are here INFORMAL Users can access apps and data from their personal device FORMAL BYOD policy, stipend, selfservice web site and support 26

27 Barriers to use of mobile technology Lack of Funding Limited Incentives for Use Immaturity of Vendors Lack of Standards/Interoperability Lack of IT Staff Inadequate Privacy/Security Lack of Staff Expertise Challenges Regarding Wireless Capabilities Lack of Executive Support Clinician Resistance to Technology Doesn't Fit in Workflow 13% 36% 32% 32% 32% 29% 27% 24% 22% 20% 51% N = 231 Source: 2015 HIMSS Mobile Technology Survey 27

28 Penn Medicine mhealth Governance focus Smartphones >> Tablets Corporate-BYOD Policy setting (security, eligibility) Infrastructure & Support Financial implications Mobile Devices Mobile Applications Functionalities Secured messaging Directory/schedules Workflow Resources Software Architecture Native vs Web App 28

29 Apps will change care delivery Courtesy of Glenn Steele, CEO of Geisinger EHR World Today The Future Benefits Data dispersed, not easily found, Useless Copy and Paste Workflows not efficient or userfriendly Minimum analytically supported clinical decision support Data extracted, reorganized and presented in a userfriendly way Workflow facilitated via clinical logic; results of analyses integrated into workflow Decision support based on analysis of data outside and inside of EHR Saves clinician time Improves quality of care Easier and less expensive to employ Difficult to implement changes Easy to program changes Increase coding scores and documentation requirements

30 Considerations of leveraging mobility in healthcare Design for today but need to anticipate tomorrow Develop and invest in existing talent (PI specialists, clinicians, designers) Incremental build start with an idea/prototype and get it into hands of frontline providers Build vs buy decisions Lack of scientific evidence to measure the efficacy of mobile apps Measure what we can, but not what counts Develop evaluation criteria focused on business cases and patient care benefits EMR integration To do or not to do Accept timeline of vendors? Partnership between Clinicians and IS 30

31 Join us 31

3 rd Annual HIMSS Analytics Mobile Survey. February 26, 2014. www.himssanalytics.org

3 rd Annual HIMSS Analytics Mobile Survey. February 26, 2014. www.himssanalytics.org 3 rd Annual HIMSS Analytics Mobile Survey February 26, 2014 www.himssanalytics.org 2013 HIMSS Analytics Mobile Technology Survey Final Report February 26, 2014 For the first time in 2011, HIMSS explored

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Leveraging Technology to Power Transformation in Today's Healthcare Environment

Leveraging Technology to Power Transformation in Today's Healthcare Environment Leveraging Technology to Power Transformation in Today's Healthcare Environment Healthcare executives, staff and clinicians consistently say they are both surprised and impressed at how new technology

More information

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are

More information

A CIO s Guide To Mobility Management

A CIO s Guide To Mobility Management The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

Session 125: A Health IT Executive s Guide To BYOD Management

Session 125: A Health IT Executive s Guide To BYOD Management Session 125: A Health IT Executive s Guide To BYOD Management Ken Congdon, Editor In Chief, Healthcare Technology Online (DISCLAIMER: The views and opinions expressed in this presentation are those of

More information

Architecture of Enterprise Mobile Apps

Architecture of Enterprise Mobile Apps Architecture of Enterprise Mobile Apps November 22, 2011 Sergey Zabaluev http://mobile.ctco.eu Setting the context Business trends need for speed and agility Highly competitive, global marketplace Increasing

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

Thou Shalt Allow BYOD

Thou Shalt Allow BYOD Thou Shalt Allow BYOD The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It s as if a voice boomed down from the mountain ordering all of

More information

Thou Shalt Allow BYOD

Thou Shalt Allow BYOD Thou Shalt Allow BYOD The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It s as if a voice boomed down from the mountain ordering all of

More information

BYOD Strategies: Chapter I

BYOD Strategies: Chapter I Building Bring-Your-Own-Device (BYOD) Strategies This is the first part in a series designed to help organizations develop their BYOD (bring-your-own-device) strategies for personally-owned smartphones

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

UNIVERSITY OF NEBRASKA - LINCOLN CELLULAR PHONE USEAGE FAQ

UNIVERSITY OF NEBRASKA - LINCOLN CELLULAR PHONE USEAGE FAQ UNIVERSITY OF NEBRASKA - LINCOLN CELLULAR PHONE USEAGE FAQ Why has this policy changed? The Department of the Treasury, through its Internal Revenue Service, issued new guidelines that clarified the taxability

More information

BYOD STRATEGIES: THE COST BYOD. The. Can BYOD. decrease. mobility costs?

BYOD STRATEGIES: THE COST BYOD. The. Can BYOD. decrease. mobility costs? BYOD STRATEGIES: THE COST I M P L I C AT I O N S O F BYOD The Can BYOD decrease mobility costs? Introducing BYOD BYOD offers the potential for employers to increase both productivity and employee satisfaction

More information

Enterprise on the Go. How enterprises can leverage mobile apps

Enterprise on the Go. How enterprises can leverage mobile apps Enterprise on the Go How enterprises can leverage mobile apps Vivek Narasimhan June 2012 Contents I. Project Scope II. Consumerization of IT drives demand for apps III. Enterprise App Considerations IV.

More information

Taking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia

Taking Charge with Apps, Policy, Security and More. October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia Taking Charge with Apps, Policy, Security and More October 2, 2010 Hilton Alexandria Mark Center Alexandria, Virginia http://pinterest.com/visualoop/byod-infographics/ vs. NSFW PSFW NSFW Security & Compliance

More information

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

MANAGING ENTERPRISE WIRELESS SERVICES TO MAXIMUM ADVANTAGE

MANAGING ENTERPRISE WIRELESS SERVICES TO MAXIMUM ADVANTAGE MANAGING ENTERPRISE WIRELESS SERVICES TO MAXIMUM ADVANTAGE Written by: Kevin DiLallo, Levine, Blaszak, Block and Boothby LLP and Ben Fox, TechCaliber Consulting, LLC August 2015 MANAGING ENTERPRISE WIRELESS

More information

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

The Bring Your Own Device Era:

The Bring Your Own Device Era: The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era

More information

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert Achieving Multi-Platform Support in the BYOD Era Presented by: Kaushik Srinivas and Josh Lambert Agenda Impact of mobile within the workplace Key bring your own device (BYOD) platforms Future trends in

More information

IT Self Service and BYOD Markku A Suistola

IT Self Service and BYOD Markku A Suistola IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

More information

Featuring industry research by. Produced by

Featuring industry research by. Produced by Featuring industry research by Produced by With the ubiquity of personal electronic devices, healthcare workers are all too commonly performing workarounds alternatives to approved workflows that bypass

More information

Nandan Banerjee Cogent Infotech Corporation COGENT INFOTECH CORPORATION

Nandan Banerjee Cogent Infotech Corporation COGENT INFOTECH CORPORATION Nandan Banerjee Cogent Infotech Corporation Health Care Cost Better, Efficient, Valuable Health care services Stakeholders demand for metrics across clinical, operational and financial disciplines. Overcoming

More information

Best Practices for Implementing an EHR System

Best Practices for Implementing an EHR System Best Practices for Implementing an EHR System Robyn Leone Director, CO-REC rleone@corhio.org The Case for EHRs Healthcare spending as a percent of our Gross Domestic Product (GDP) at unprecedented high

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags) perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise

More information

A Guide to Choosing the Right EMR Software. A Guide to Choosing the Right EMR Software

A Guide to Choosing the Right EMR Software. A Guide to Choosing the Right EMR Software A Guide to Choosing the Right EMR Software A Guide to Choosing the Right EMR Software Eight Important Benchmarks for Community and Critical Access Hospitals Eight Important Benchmarks for Community and

More information

Compliance Management for Mobile Devices

Compliance Management for Mobile Devices Compliance Management for Mobile Devices MOBILE SOLUTIONS Agenda Mobile Device Use Today Mobile Device Use Tomorrow Mobile Device Configuration Challenges in the Mobile Device Environment Policy and Configuration

More information

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014 The BYOD of Tomorrow: BYOD 2.0 Cesar Picasso, MBA SOTI Inc. April 02, 2014 What is BYOD 1.0? BYOD 1.0 was the first wave of mobile device management that controlled the entire device BYOD 1.0 was inadequate

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones

More information

Mobile Applications in Community-Based Mental Health: The Time is Now

Mobile Applications in Community-Based Mental Health: The Time is Now Mobile Applications in Community-Based Mental Health: The Time is Now 1 Executive Summary Behavioral health providers face increasing challenges to support larger caseloads and productivity goals, regulatory

More information

SOLUTION BRIEF June 2014. How do you capitalize on mobility opportunities in healthcare, both today and in the long term?

SOLUTION BRIEF June 2014. How do you capitalize on mobility opportunities in healthcare, both today and in the long term? SOLUTION BRIEF June 2014 How do you capitalize on mobility opportunities in healthcare, both today and in the long term? SOLUTION BRIEF While bring your own device (BYOD) and physician texting are hot

More information

Managing Mobility in the BYOD Era:

Managing Mobility in the BYOD Era: Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in

More information

Wireless Communication Device Allowance

Wireless Communication Device Allowance Wireless Communication Device Allowance Policy Type: Administrative Responsible Office: Vice President for Finance and Administration Initial Policy Approved: 04/05/2012 Current Revision Approved: 12/11/2014

More information

Policies Covering Mobile Phones

Policies Covering Mobile Phones Policies Covering Mobile Phones MAPI Council Survey January 2012 No. 215 By: Don Norman Council Director and Economist danorman@mapi.net Assisted By: Jun Lee Research Associate Manufacturers Alliance for

More information

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM ENTERPRISE BYOD BEST PRACTICES 1 ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM BYOD, Bring Your Own Device, is a rapidly growing trend in which

More information

Advisors, Inc. Q 6. An Employee Benefits Capabilities Presentation. Q 6 Advisors, Inc.

Advisors, Inc. Q 6. An Employee Benefits Capabilities Presentation. Q 6 Advisors, Inc. Q 6 Advisors, Inc. An Employee Benefits Capabilities Presentation Q 6 Advisors, Inc. Q 6 Advisors, Inc. Strategic Guidance for Intelligent Decisions 333 Earle Ovington Blvd., Suite 402 Uniondale, NY 11553

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources

Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources NIST/OCR Conference June 6, 2012 Speaker Lisa A. Gallagher, BSEE, CISM, CPHIMS Senior Director, Privacy and Security

More information

This procedures memorandum systematizes the use of mobile communications devices such as cell phones for College business.

This procedures memorandum systematizes the use of mobile communications devices such as cell phones for College business. OTHER TOPICS Index No. X-13 PROCEDURES MEMORANDUM TO: FROM: SUBJECT: MCC Staff Office of the President Cell Phones DATE: September 3, 2014 PURPOSE: SCOPE: This procedures memorandum systematizes the use

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Mobile Device and Application Strategy. Right Technology, Right Design, Right Price

Mobile Device and Application Strategy. Right Technology, Right Design, Right Price Mobile Device and Application Strategy Right Technology, Right Design, Right Price Agenda 1 Mobility Strategy Methodology 2 3 Mobile Device Strategy Mobile Application Development 4 Q &A Mobility Strategy

More information

A Radicati Group Web Event

A Radicati Group Web Event The Radicati Group, Inc. www.radicati.com A Radicati Group Web Event ** Please dial-in by phone to listen to the audio portion of this event. The dial-in number is in your registration confirmation email

More information

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile

More information

How Technology Executives are Managing the Shift to BYOD

How Technology Executives are Managing the Shift to BYOD A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the

More information

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD

More information

Mobile Device Security Is there an app for that?

Mobile Device Security Is there an app for that? Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

The Holistic Guide to BYOD in Your Business Jazib Frahim

The Holistic Guide to BYOD in Your Business Jazib Frahim The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

MDM Mobile Device Management

MDM Mobile Device Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

IL-HITREC P.O. Box 755 Sycamore, IL 60178 Phone 815-753-1136 Fax 815-753-2460 email info@ilhitrec.org www.ilhitrec.org

IL-HITREC P.O. Box 755 Sycamore, IL 60178 Phone 815-753-1136 Fax 815-753-2460 email info@ilhitrec.org www.ilhitrec.org IL-HITREC P.O. Box 755 Sycamore, IL 60178 Phone 815-753-1136 Fax 815-753-2460 email info@ilhitrec.org www.ilhitrec.org INTRODUCTION BENEFITS CHALLENGES WHY NOW? HOW WE HELP SUMMARY Better patient care

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Better patient care and better practice management

Better patient care and better practice management www.hitecla.org INTRODUCTION BENEFITS CHALLENGES WHY NOW? INCENTIVES FOR PROVIDERS HOW WE HELP SUMMARY Better patient care and better practice management Using Electronic Health Records in a meaningful

More information

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013

More information

03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement

03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement Bring Your Own Device: A Framework for Audit Emily A Knopp, CPA, CISA Audit Director Angelo State University, Member of Texas Tech University System March 6, 2014 Texas Association of College of University

More information

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com ipad in the News More and more ipads will find their way into the workplace in

More information

MINISTRY OF HEALTH ELECTRONIC MEDICAL RECORDS

MINISTRY OF HEALTH ELECTRONIC MEDICAL RECORDS MINISTRY OF HEALTH ELECTRONIC MEDICAL RECORDS MEXICO CITY November 10, 2010 OVERVIEW Why Electronic Medical Records (EMR)? Planning, Implementation & Challenges Observed Outcomes Valuable Lessons 1 EMR

More information

Securing data on mobile devices without compromising the user experience

Securing data on mobile devices without compromising the user experience Securing data on mobile devices without compromising the user experience Mobile Workspaces Mobile users need access to businessgrade apps and company data from any device. Desktops Apps Data Collaboration

More information

Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources

Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources HOA Mobility Conference Sept 27, 2012 Speaker Lisa A. Gallagher, BSEE, CISM, CPHIMS Senior Director, Privacy

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

A Mobile Architecture, Not Just a Mobile App

A Mobile Architecture, Not Just a Mobile App A Mobile Architecture, Not Just a Mobile App Gary Audin Delphi, Inc. May 2013 CONTENTS 2 Meeting the Mobility Challenge 2 The Impact of BYOD 3 What to Gain with Mobile Communications 4 The Right Mobile

More information

Dell World Software User Forum 2013

Dell World Software User Forum 2013 Dell World Software User Forum 2013 December 9-12 Austin, TX Introducing Dell Enterprise Mobility Management Brandon Herrin and Jason Moody Agenda Mobility/BYOD needs across the workforce Introducing Dell

More information

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s

#mstrworld. Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s #mstrworld Support BYOD with MicroStrategy Mobile to cut costs and deploy to 1000s!! Ivar Ljungberg Principal Consultant, MicroStrategy Mobile Advisory Team, EMEA BYOD Agenda What is BYOD? Why BYOD? Challenges

More information

Enabling the Mobile Enterprise: Don t fight it. Feature it.

Enabling the Mobile Enterprise: Don t fight it. Feature it. EOH CIO CIO Connect Connect White Paper White Enabling the Paper Mobile Enterprise Enabling the Mobile Enterprise: Don t fight it. Feature it. By Alex Russell, EOH The Bring Your Own Device (BYOD) trend

More information

The. C s. of Mobile Device. Management

The. C s. of Mobile Device. Management The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile Device Management

More information

50 shades of Siebel mobile

50 shades of Siebel mobile 50 shades of Siebel mobile Markus Schneeweis ec4u expert consulting AG 1 Agenda Start Part 1 The disruption Part 2 What means mobile? Part 3 Siebel Mobile clash of the generations? Part 4 Our offer 7 Key

More information

Mobile Device Usage and Agreement Policy

Mobile Device Usage and Agreement Policy Page 1 of 10 1.0 Introduction Mobile Device Usage and Agreement Policy The State of Minnesota provides several electronic tools for employees whose job performance requires or would be enhanced by their

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

PARTNER LOGO. The. C s. Mobile Device Management

PARTNER LOGO. The. C s. Mobile Device Management PARTNER LOGO The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile

More information

Effectively Managing EHR Projects: Guidelines for Successful Implementation

Effectively Managing EHR Projects: Guidelines for Successful Implementation Phoenix Health Systems Effectively Managing EHR Projects: Guidelines for Successful Implementation Introduction Effectively managing any EHR (Electronic Health Record) implementation can be challenging.

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps September 9 11, 2013 Anaheim, California SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps Susan Beyer NTT DATA, Inc. Agenda What is the whole buzz about Mobility? How to expand your BPC footprint

More information

BYOD: The Threats and the Opportunity for Carriers

BYOD: The Threats and the Opportunity for Carriers BYOD: The Threats and the Opportunity for Carriers Adrian Drury, Practice Leader, Consumer Impact Technology adrian.drury@ovum.com Richard Absalom, Analyst, Consumer Impact Technology richard.absalom@ovum.com

More information

Mobilize your Enterprise in 60 Minutes!

Mobilize your Enterprise in 60 Minutes! Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Technology in Health Care A changing landscape presented by: Rick Casteel Vice President, Information Technology Upper Chesapeake Health

Technology in Health Care A changing landscape presented by: Rick Casteel Vice President, Information Technology Upper Chesapeake Health Technology in Health Care A changing landscape presented by: Rick Casteel Vice President, Information Technology Upper Chesapeake Health Rick Casteel Graduated from Havre de Grace High Graduated from Harford

More information

Gartner's View on 'Bring Your Own' in Client Computing

Gartner's View on 'Bring Your Own' in Client Computing G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting

More information

MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM

MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM PREPARED BY DANIEL MAYCOCK AND FRED CLARKE SLALOM CONSULTING INTRODUCTION The use of mobile devices in enterprises is

More information

Simplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3

Simplifying Mobility Management. WhitePaper VERAMARK 2013 TEM SERIES, #3 Simplifying Mobility Management WhitePaper VERAMARK 2013 TEM SERIES, #3 Simplifying Mobility Management New solutions for the wireless world If you don t already have a mobility management strategy in

More information

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device

More information

Enterprise Analytics Strategic Planning

Enterprise Analytics Strategic Planning Enterprise Analytics Strategic Planning June 5, 2013 1 "The first question a data driven organization needs to ask itself is not "what do we think?" but rather "what do we know? Big Data: The Management

More information

The HITECH Act: A Grand Experiment In HIT Implementation and Sustainability. Kim Dunn, MD, Ph.D.

The HITECH Act: A Grand Experiment In HIT Implementation and Sustainability. Kim Dunn, MD, Ph.D. The HITECH Act: A Grand Experiment In HIT Implementation and Sustainability August 11, 2011 Kim Dunn, MD, Ph.D. Agenda Historical Context for Reform Overview of ARRA Funded Programs Implications for Texas

More information

BYOD Policy Implementation Guide. February 2016 March 2016

BYOD Policy Implementation Guide. February 2016 March 2016 BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...

More information