Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Similar documents
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Electronic Communication In Your Practice. How To Use & Mobile Devices While Maintaining Compliance & Security

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

HELPFUL TIPS: MOBILE DEVICE SECURITY

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

HIPAA Requirements and Mobile Apps

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

Data Protection Act Bring your own device (BYOD)

When HHS Calls, Will Your Plan Be HIPAA Compliant?

Managing Mobile Device Security

PREP Course # 20: HIPAA Security Presented by: Joe Baskin, Manager, Information Security

OCR UPDATE Breach Notification Rule & Business Associates (BA)

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

BYOD Policy for [AGENCY]

Best Practices Guide to Electronic Banking

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

Business ebanking Fraud Prevention Best Practices

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

SHS Annual Information Security Training

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients

ONE Mail Direct for Mobile Devices

Information Technology Branch Access Control Technical Standard

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Data Security in the Insurance Industry: WHAT YOU NEED TO KNOW

How to Practice Safely in an era of Cybercrime and Privacy Fears

My Docs Online HIPAA Compliance

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

Network Security for End Users in Health Care

CHIS, Inc. Privacy General Guidelines

Securing Health Data in a BYOD World

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

Montclair State University. HIPAA Security Policy

Business Internet Banking / Cash Management Fraud Prevention Best Practices

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central.

Reliance Bank Fraud Prevention Best Practices

Healthcare to Go: Securing Mobile Healthcare Data

State of South Carolina Policy Guidance and Training

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

Security Is Everyone s Concern:

ISO 27002:2013 Version Change Summary

Information Security It s Everyone s Responsibility

Bring Your Own Device

An Independent Member of Baker Tilly International

Straight from the Source: HHS Tools for Avoiding Some of the Biggest HIPAA Mistakes

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

Security, privacy, and incident response issues are often

Why you need. McAfee. Multi Acess PARTNER SERVICES

HIPAA Security COMPLIANCE Checklist For Employers

Cyber Self Assessment

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Mangesh Sawant. Information Security Risks for Business Professionals Traveling to China

Mobile Device Security

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Use Bring-Your-Own-Device Programs Securely

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

General Security Best Practices

Have you ever accessed

How To Protect Your Data From Being Stolen

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

Use of Mobile Apps in the Workplace:

University of Cincinnati HIPAA Administrative, Physical and Technical Safeguards

MOBILE BANKING USER GUIDE

Why Encryption is Essential to the Safety of Your Business

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Cybersecurity A Clear and Present Danger

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Security Guidelines and Best Practices for Internet Banking for Precision and Cash Management for Precision. Best Practices Guide

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Meaningful Use Crosswalk to the Security Rule

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Mobile Health Apps 101: A Primer for Consumers. myphr.com

PHI- Protected Health Information

UIT Security is responsible for developing security best practices, promoting security awareness, coordinating security issues, and conducting

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

Mobile Device as a Platform for Assured Identity for the Federal Workforce

Wellesley College Written Information Security Program

Mobile Device Management

The User is Evolving. July 12, 2011

Cyber Security. John Leek Chief Strategist

Don t Let A Security Breach Put You Out of Business

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

BYOD. opos WHAT IS YOUR POLICY? SUMMARY

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Security Guidelines and Best Practices for Retail Online and Business Online

Mobile Device Management Solution Hexnode MDM

Security for the Road Warrior

HIPAA Compliance Guide

SECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business

BYOD: End-to-End Security

Transcription:

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include: A lost mobile device A stolen mobile device Inadvertently downloading viruses or other malware Unintentional disclosure to unauthorized users Using an unsecured Wi-Fi network 2

Take the Steps to Protect and Secure Health Information When Using a a Mobile Device The resource center http://www.healthit.gov/mobiledevices was created to help providers and professionals: Protect and secure health information when using mobile devices In a public space On site At a remote location Regardless of whether the mobile device is Personally owned, bring their own device (BYOD) Provided by an organization 3

Mobile Devices: Tips to to Protect and Secure Health Information Use a password or other user authentication. Keep security software up to date. Install and enable encryption. Research mobile applications (apps) before downloading. Install and activate wiping and/or remote disabling. Disable and do not install file- sharing applications. Install and enable a firewall. Install and enable security software. Maintain physical control of your mobile device. Use adequate security to send or receive health information over public Wi-Fi networks. Delete all stored health information before discarding or reusing the mobile device. 4

Understanding and Following Organizational Policies Polices and Procedures Health care providers and professionals are responsible for learning and understanding their health care organization s mobile device policies including: Policies and procedures on: Bring your own device (BYOD) Mobile device registration Mobile device information storage Backup information stored on mobile devices Remote wiping and/or disabling Professionals and providers should also be aware of the: Organization s privacy and security officer(s) Virtual private network (VPN) Mobile device privacy and security awareness and training 5

Five Five Steps Steps Organizations Organizations Can Can Take Take to to Manage Manage Mobile Mobile Devices Devices 1.) DECIDE Decide whether mobile devices will be used to access, receive, transmit, or store patients health information or be used as part of the organization s internal networks or systems (e.g., your EHR system). 2.) ASSESS Consider how mobile devices affect the risks (threats and vulnerabilities) to the health information the organization holds. 3.) IDENTIFY Identify the organization s mobile device risk management strategy, including privacy and security safeguards. 4.) DEVELOP, DOCUMENT, and IMPLEMENT Develop, document, and implement the organization s mobile device policies and procedures to safeguard health information 5.) TRAIN Conduct mobile device privacy and security awareness and training for providers and professionals. 6

Mobile Devices and Health Information: What to Avoid Mobile Devices and Health Information: What to Avoid Sharing your mobile device password or user authentication Allowing the use of your mobile device by unauthorized users Storing or sending unencrypted health information with your mobile device Ignoring mobile device security software updates Downloading applications (apps) without verifying they are from a trusted source Leaving your mobile device unattended Using an unsecured Wi-Fi network Discarding your mobile device without first deleting all stored information Ignoring your organization s mobile device policies and procedures 7

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Learn more at http://www.healthit.gov/mobiledevices 8