By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: mHealth & Multi-Compliance
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Mobile Health > mHealth & Multi-Compliance
eHealthMobile Health

mHealth & Multi-Compliance

onlinetech
onlinetech
Share
4 Min Read
SHARE

Last week, Eric Wicklund, Editor of mHIMSS.org reported on new tools for physicians and patients to support payment processing and the ability to check insurance eligibility while using an iPad, iPhone or iPod Touch.

These tools must, by nature of their industry and function, satisfy both PCI DSS (Payment Card Industry Data Security Standard) compliance (to accept credit card payments) and HIPAA (Health Insurance Portability and Accountability Act) compliance (to protect personally identifiable and patient health information).

Last week, Eric Wicklund, Editor of mHIMSS.org reported on new tools for physicians and patients to support payment processing and the ability to check insurance eligibility while using an iPad, iPhone or iPod Touch.

These tools must, by nature of their industry and function, satisfy both PCI DSS (Payment Card Industry Data Security Standard) compliance (to accept credit card payments) and HIPAA (Health Insurance Portability and Accountability Act) compliance (to protect personally identifiable and patient health information).

More Read

Jack Dorsey on Innovation and Life
Can You Own a Hashtag?
Why Point-of-Care Diagnostic Testing Will Become a Game-changer in Healthcare
HIMSS 2012: Preview
Telemedicine: CY 2015 MPFS Reportage and Dangers of the Echo Chamber

The company that developed these tools is drchrono, a California-based company known initially for developing an electronic health record (EHR) system for the iPad. This new realm of mobile devices and the need for multi-compliance is an emerging trend that requires a layered security approach to meet each standard.

This particular tool works in conjunction with another company’s tool, called Square. The actual device is a card reader that, once plugged into a mobile device audio jack, allows credit card data to be collected with a mere swipe. The transaction goes directly to the physician’s or practice’s bank account, and is updated in their practice management system. Physicians can also check health insurance eligibility in real-time using the tool.

What does this mean for service providers previously supporting e-commerce and healthcare industries separately? No longer can hosting providers only offer proof of their PCI DSS audit and report on compliance if they intend to support healthcare and mobile healthcare apps. An independent HIPAA audit and report on compliance is recommended to determine which standards are within the scope of a provider’s service.

Conversely, the rare few providers that have been initially more healthcare-focused must realize certain technology and security standards that are only best practice or highly recommended for HIPAA, are, in fact, explicitly required by PCI.

For example, two-factor authentication is an additional, enhanced security measure that a covered entity (physician or other healthcare provider) can use to ensure only authorized persons can access sensitive information. But for PCI compliance, it is specifically stated in requirement 8.3:

Incorporate two-factor authentication for remote access (network-level access originating from outside the network) to the network by employees, administrators, and third parties.

File integrity monitoring (FIM) is another security method that monitors and sends alerts when a few key file changes occur within a system, such as change of ownership, security settings or configuration values. While recommended to help protect healthcare data, it is required by PCI under the 10.5.5 sub-requirement stating,

Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts (although new data being added should not cause an alert).

As well as the 11.5 clause that requires:

Deploy file integrity monitoring tools to alert personnel to unauthorized modification of critical system files, configuration files or content files. Configure the software to perform critical file comparisons at least weekly.

 

TAGGED:mHealth security
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

AI agents in healthcare
AI Agents in Healthcare: How Sully.ai’s Virtual Team is Transforming Hospital Operations
Hospital Administration Technology
November 26, 2025
hospitality jobs health benefits
The Health Benefits of J-1 Hospitality Careers
Career
November 23, 2025
healing care
Why Healing Spaces Depend On Healthy Building Systems
Infographics News
November 19, 2025
clean water importance
Protecting Patients Through Strong Water Safety Practices In Healthcare Facilities
Health Infographics
November 19, 2025

You Might also Like

digital tools
eHealthFinancePublic HealthTechnology

PCORI Challenge Awards $125K to 8 Digital Tools That Connect Patients & Researchers

June 5, 2013

DC Health Data and Innovation Week 2012

June 11, 2012

American Recall Center New Resource for Consumers [VIDEO]

October 2, 2013
patient access to images
eHealthTechnology

HIMSS 2014: Portals Provide Benefits to Physicians and Patients, With Few Barriers to Access

February 19, 2014
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?