MOBILITY STRATEGIES IN HEALTHCARE 2014
|
|
|
- Russell Osborne
- 10 years ago
- Views:
Transcription
1 MOBILITY STRATEGIES IN HEALTHCARE 2014 SM
2 WHICH TYPES OF MOBILE DEVICES DOES YOUR ORGANIZATION SUPPORT? The rise in mobile device usage in hospitals brings the potential for faster communications that can improve patient care. With smartphone and tablet usage, however, come concerns about information security and questions about access to different types of information. These questions are prompting many hospitals to develop mobility strategies detailing how these devices can be leveraged, who pays for them, and more. In June 2014, Spok surveyed more than 600 healthcare organizations to take a snapshot of this trend and see how far along hospitals are in devising their strategies. Survey participants were from hospitals of all sizes across the globe and included leadership in clinical, IT, and telecommunications departments. Thank you to all who participated - your input is greatly appreciated. Key take-away: Different devices fit better for different roles, so standardization is highly unlikely. Having a platform with the ability to effectively communicate with a diverse array of devices is essential. *Many of the survey respondents who stated other indicated staff use regular cell phones and laptops as well
3 THE MAIN DRIVERS OF USING SMARTPHONES AND OTHER MOBILE DEVICES Secondary equipment alarm notification IDENTIFIED BENEFITS OF GOING MOBILE Easily view and prioritize patient needs Monitor alarms Facilitate peer-to-peer communication Quickly track people down Interface with patient monitoring and nurse call systems Greater communication
4 BYOD VS. HOSPITAL-ISSUED DEVICES, THE AVERAGE PICTURE: BYOD VS. HOSPITAL-ISSUED DEVICES, A DETAILED LOOK: There is no industry standard regarding the choice to allow personal devices under a bringyour-own-device (BYOD) plan. Some facilities reported having 100 percent hospital-issued devices, some are 100 percent BYOD, and there is wide variation in between.
5 ARE YOU USING A MOBILE DEVICE MANAGEMENT (MDM) SOLUTION IN YOUR ORGANIZATION? Some organizations are looking at Mobile Device Management (MDM) options to address challenges associated with the diversity of devices. An MDM solution can give organizations the ability to view and manage all devices from a central admin console. Survey respondents said the most important features they were looking for in an MDM solution were device encryption and enforcing device passwords. WHAT TYPES OF SMARTPHONES DOES YOUR ORGANIZATION SUPPORT?
6 DO YOU HAVE A DOCUMENTED MOBILITY STRATEGY AT YOUR HOSPITAL? What is the Goal of Your Organization s Mobility Strategy? 1 Security (for devices, information) 2 Communication (fast, easy, effective) 3 Access (to information) To secure ephi on all mobile devices against loss or theft. To make communication easy - getting the right messages to the right people at the right time; to support the workflow of each area and help improve patient care. Of those who said no, 33% are actively in the process of developing a strategy Increase mobile access to facilitate patient care.
7 TOP THREE AREAS COVERED BY EXISTING MOBILITY STRATEGIES: Device types supported (e.g., pagers, smartphones, Wi-Fi phones, tablets, etc.) Security of devices Security of information transmission over networks THE TOP THREE AREAS OF CONCERN: Security of information transmission over networks Security of devices 60 percent of respondents expressed HIPAA, HITECH concerns for devices lost, stolen or hacked Budget Device related costs, maintenance and employee training To protect patient information, the Department of Homeland Security advises securing communication channels with encryption, requiring user authentication at both ends, and enforcing password policies 1. There are hardware and software options available to address these concerns, including secure texting apps that enhance provider workflows with access to the staff directory, on-call schedules, and critical test results. IS DEVELOPING A DOCUMENTED MOBILITY STRATEGY A FUTURE INITIATIVE? For thoughts on some of the common challenges faced by hospitals during the design, implementation, and continued evolution of mobility strategies, here is a guide for reference. * U.S. Department of Homeland Security. Attack Surface: Healthcare and Public Health Sector. 4 May, Bulletin. 7 Aug,
8 WHO WILL BE INVOLVED IN CREATING YOUR ORGANIZATION S MOBILITY STRATEGY? Since 2012, the level of involvement by IT, Telecom and clinical leadership in development of mobility strategies has remained the same. Participation by clinicians, however, has declined. From highs of 45 and 36 percent, estimates for doctor and nurse input on mobility strategy design has dropped to 28 and 17 percent, respectively. Yet 80 percent of survey participants said their organization has stated goals to improve nurse-to-physician communications, and 76 percent have goals to improve physician-to-physician communications. Experts who have been through the process advise including users in the planning committee, especially with BYOD considerations 2. Caregiver involvement helps ensure the right devices and applications are appropriately integrated into clinical workflows, and that providers will be on board with new policies. 2
9 WHAT TYPES OF INFORMATION DO SMARTPHONE USERS CURRENTLY HAVE ACCESS TO? LOOKING AT THE FUTURE One year from now respondents anticipate an increase in smartphone users having access to critical test results and alerts from clinical systems SUMMARY With three years of data from our Mobility Strategies in Healthcare survey, we can begin to see trends emerge. First, the number of facilities with a documented strategy has increased from 34 to 44 percent. This growth is slower than anticipated, possibly because Meaningful Use, ICD-10, and other initiatives compete for the same implementation resources: motivation, time, and attention. The mix of mobile devices in healthcare has remained largely unchanged, with only small increases in tablet and smartphone support (4 and 5 percent, respectively). Hospitals continue to report efficiency and communication coordination as the main drivers for mobile device usage, while security of information remains the top concern. Perhaps the most startling discovery this year is the reported decline of clinical staff involvement in mobility strategy development. This contrasts sharply with survey respondents stated goals to improve clinician communications. Facilities may be missing an important opportunity to hear feedback from doctors and nurses during the design process. Without input from end users on the workflow challenges, mobility strategies may be less effective and face increased opposition to adoption.
10 SM ABOUT SPOK, INC. Spok, Inc., a wholly owned subsidiary of Spok Holdings, Inc. (NASDAQ: SPOK), headquartered in Springfield, Va., is proud to be a leader in critical communications for healthcare, government, public safety, and other industries. We deliver smart, reliable solutions to help protect the health, well-being, and safety of people around the globe. More than 125,000 organizations worldwide rely on Spok for workflow improvement, secure texting, paging services, contact center optimization, and public safety response. When communications matter, Spok delivers. spok.com / Spoktweets Spok, Inc All Rights Reserved. Spok is a trademark of USA Mobility, Inc. Other names and trademarks may be the property of their respective owners.
BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED
SM BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED HOW DO YOU BYOD? A popular topic for hospitals right now is whether to allow employees to use their personal smartphones
YOUR PARTNER FOR PAGING IN HEALTHCARE
SM YOUR PARTNER FOR PAGING IN HEALTHCARE THE ONGOING POWER OF PAGING FOR CRITICAL HEALTHCARE COMMUNICATIONS Paging has long been the cornerstone of critical mobile communication. Even today, no mobile
SPOK HEALTHCARE CONSOLE. Improving the Way Your Hospital Contact Centre Manages Critical Communications
SM SPOK HEALTHCARE CONSOLE Improving the Way Your Hospital Contact Centre Manages Critical Communications YOUR CRUCIAL ROLE IN PATIENT CARE If nurses need to contact clinicians about their patients conditions,
Healthcare. Visibility: when and where you need it
Healthcare Visibility: when and where you need it Why Philips visibility solutions? Make informed decisions at the point of care Streamline workflow to accelerate care delivery Simplify IT operations to
PUBLIC SAFETY SOLUTIONS OVERVIEW. Communication Software for Mobility, Efficiency, and Safety
SM PUBLIC SAFETY SOLUTIONS OVERVIEW Communication Software for Mobility, Efficiency, and Safety DECADES OF EXPERIENCE IMPROVING PUBLIC SAFETY RESPONSE WITH ADVANCED COMMUNICATIONS For decades, Spok has
HEALTHCARE SOLUTIONS OVERVIEW. Spok Care Connect A Fully Integrated Communications Platform
SM HEALTHCARE SOLUTIONS OVERVIEW Spok Care Connect A Fully Integrated Communications Platform ENABLING CARE, SAFETY, AND EFFICIENCY IN A CHANGING HEALTHCARE ENVIRONMENT Hospitals today are faced with many
HOW SMART DEVICES AND MIDDLEWARE INTEGRATION ARE REVOLUTIONIZING HEALTHCARE
WHITEPAPER HOW SMART DEVICES AND MIDDLEWARE INTEGRATION ARE REVOLUTIONIZING HEALTHCARE BYOD & Healthcare Since the release of Apple s first iphone in 2007, consumer smartphone adoption has been a driving
E9-1-1 SOLUTIONS OVERVIEW. Enabling Superior Management of 9-1-1 Calls
SM E9-1-1 SOLUTIONS OVERVIEW Enabling Superior Management of 9-1-1 Calls ENABLING SUPERIOR MANAGEMENT OF 9-1-1 CALLS SAFETY IS YOUR RESPONSIBILITY. ENHANCED 9-1-1 IS OUR BUSINESS. Providing a safe and
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
EasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
The CIO s Guide to HIPAA Compliant Text Messaging
The CIO s Guide to HIPAA Compliant Text Messaging Executive Summary The risks associated with sending Electronic Protected Health Information (ephi) via unencrypted text messaging are significant, especially
HOW SMART DEVICES AND MIDDLEWARE INTEGRATION ARE REVOLUTIONIZING HEALTHCARE
HOW SMART DEVICES AND MIDDLEWARE INTEGRATION ARE REVOLUTIONIZING HEALTHCARE An Ascom White Paper BYOD & Healthcare Since the release of Apple s first iphone in 2007, consumer smartphone adoption has been
Mobile Device Security Is there an app for that?
Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach
SysAid MDM User Guide for ios
SysAid MDM User Guide for ios Table of Contents Introduction Enrolling Your ios Mobile Device in SysAid MDM Unenrolling Your ios Mobile Device from SysAid MDM Have Any Questions? Introduction SysAid Mobile
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Mobile Health Apps 101: A Primer for Consumers. myphr.com
Mobile Health Apps 101: A Primer for Consumers just think APP This guide is designed to help you understand and make educated decisions about using mobile health applications ( app ). When considering
Tom Schauer TrustCC [email protected] 253.468.9750 - cell
Tom Schauer TrustCC [email protected] 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü
Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice
Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice Agenda Learning objectives for this session Fundamentals of Mobile device use and correlation to HIPAA compliance HIPAA
BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
Secure Endpoint Management. Presented by Kinette Crain and Brad Lewis
Secure Endpoint Management Presented by Kinette Crain and Brad Lewis Brad Lewis Brad Lewis - Service Specialist 14 years of IT experience In-House Support Manager Network Administrator Assessing Risk:
Healthcare Delivery. Transforming. through Mobility Solutions. A Solution White Paper - version 1.0
Transforming Healthcare Delivery through Mobility Solutions A Solution White Paper - version 1.0 HTC Global Services HTC Towers, No. 41, GST Road, Guindy, Chennai - 600 032, India. Ph: +91 44 4345 3500
Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc.
Managing Mobile: BYOD, MDM, MAM, and more acronyms John H Sawyer Senior Security Analyst InGuardians, Inc. Who Am I? InGuardians Senior Security Analyst Penetration Testing Web, Network, Smart Grid, Mobile,
Cortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
How To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
Clinical Workflow Solutions EXTENSION HealthAlert
Clinical Workflow Solutions EXTENSION HealthAlert NEC Corporation of America necam.com EXTENSION s suite of solutions unites the various clinical information systems in a medical environment to deliver
Five Strategies Small and Medium Enterprises Can Use to Successfully Implement High Value Business Mobility
Five Strategies Small and Medium Enterprises Can Use to Successfully Implement High Value Business Mobility Smartphone and tablet-based business mobility has become commonplace in enterprises of all sizes.
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014 Agenda Introduction / Session Overview HIT Budgeting 101 Security and Compliance EHR budgeting HIT Where Are We Going Q & A 2 Copyright
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
PULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK
A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK Chris Apgar Andy Nieto 2015 OVERVIEW How to get started assessing your risk What your options are how to protect PHI What s the
Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace
Everything You Need to Know About Effective Mobile Device Management mastering the mobile workplace Table of Contents Introduction... 3 1. What exactly is Mobility Management Anyway?... 4 Impenetrable
Latest IT Trends For Secure Mobile Collaboration
A Custom Technology Adoption Profile Commissioned By Cisco Systems September 2013 Corporate Mobility Momentum Accelerates Among Enterprises The pace of enterprises deploying corporate mobility initiatives
Six Steps Healthcare Organizations Can Take to Secure PHI on Mobile Devices
Six Steps Healthcare Organizations Can Take to Secure PHI on Mobile Devices As an IT professional for a covered entity in the heavily regulated health care field, you no doubt worked hard building a secure
White Paper: Secure Printing and Mobile Devices
White Paper: Secure Printing and Mobile Devices Secure Printing and Mobile Devices 1 Introduction... 3 2 The Importance of IT Security... 3 3 Industry Overview... 4 4 Printing and Mobile Security Solutions...
Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Fiberlink, MaaS360, associated logos, and the names of the products and services of Fiberlink are marks, brands, logos, and symbols may be trademarks or
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
Next-Era Home Health Care and Enhanced HIPAA Compliance
Next-Era Home Health Care and Enhanced HIPAA Compliance EMPOWERED BY MOBILE DOCUMENT MANAGEMENT AND DIGITAL PEN FORMS CAPTURE TECHNOLOGIES Agenda Purpose and Background Cultural Objectives ( Key Drivers
7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com
7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Spok Template v2 7/8/2015
COMMUNICATION TOOLS TO COMPLEMENT THE EHR Brian Edds, Vice President Product Strategy at Spok, Inc. ABOUT SPOK Decades of experience managing healthcare communications 98% customer satisfaction scores
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
McAfee Enterprise Mobility Management
McAfee Enterprise Mobility Management Providing mobile application enablement and HIPAA security compliance Table of Contents HIPAA and ephi 3 Overview of 3 HIPAA Compliance for Remote Access 4 Table 1.
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Xerox Mobile Link App Benefits Examples
App Benefits Examples Contents Case 1: Healthcare Forms ing Case 2: Auto Lease Case 3: Sales Contract ing Case 4: Enrollment and Registrations Case 5: Insurance Claims ing Case 6: Editorial Markups/ Collaboration
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Cloud Managed Printing
Cloud Managed Printing Driverless Printing ezeep for desktop is a virtual print driver for Mac and Windows. It enables users to print to any printer right from their desktop applications without the need
5 Must-Haves for an Enterprise Mobility Management (EMM) Solution
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
Sybase Afaria. Comprehensive Management and Security for the Mobile Enterprise PRODUCT BROCHURE. www.sybase.com
Sybase Afaria Comprehensive Management and Security for the Mobile Enterprise PRODUCT BROCHURE www.sybase.com "By 2013, mobile phones will overtake PCs as the most common Web access device worldwide. The
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
Multi-Factor Authentication FAQs
General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your
White Paper. Identifying Network Security and Compliance Challenges in Healthcare Organizations
Identifying Network Security and Compliance Challenges in Healthcare Organizations Contents Introduction....................................................................... 3 Increased Demand For Access............................................................
anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape
Office anywhere, anytime expectations Bring Your Own Device goes mainstream enabling mobility critical for success changing security landscape Consumers adopting mobile RISKS Users Devices Apps Data Users
The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014
The BYOD of Tomorrow: BYOD 2.0 Cesar Picasso, MBA SOTI Inc. April 02, 2014 What is BYOD 1.0? BYOD 1.0 was the first wave of mobile device management that controlled the entire device BYOD 1.0 was inadequate
3 rd Annual HIMSS Analytics Mobile Survey. February 26, 2014. www.himssanalytics.org
3 rd Annual HIMSS Analytics Mobile Survey February 26, 2014 www.himssanalytics.org 2013 HIMSS Analytics Mobile Technology Survey Final Report February 26, 2014 For the first time in 2011, HIMSS explored
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Mobile Application Management
Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER July 2012 Meeting the BYOD challenge with next-generation application and device management Overview... 3 The Challenge... 4 MAM Functions...
