By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
    Health
    Healthcare organizations are operating on slimmer profit margins than ever. One report in August showed that they are even lower than the beginning of the…
    Show More
    Top News
    healthcare cybersecurity
    4 Helpful Tips on How to Protect Your Medical Practice Against Cyber Attacks
    October 24, 2021
    Health Check Diagnosis Medical Condition Analysis Concept
    6 Health Woes With Online Remedies
    January 19, 2022
    Eight Things Men Should Know About the Male Menopause
    Eight Things Men Should Know About the Male Menopause
    April 24, 2022
    Latest News
    Beyond Nutrition: Everyday Foods That Support Whole-Body Health
    June 15, 2025
    The Wide-Ranging Benefits of Magnesium Supplements
    June 11, 2025
    The Best Home Remedies for Migraines
    June 5, 2025
    The Hidden Impact Of Stress On Your Body’s Alignment And Balance
    May 22, 2025
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
    Policy and Law
    Get the latest updates about Insurance policies and Laws in the Healthcare industry for different geographical locations.
    Show More
    Top News
    healthy nursing school habits
    Healthy Habits for Nursing Student Nursing School Students
    May 24, 2024
    High Deductables
    High-Deductible Insurance and Rising Bad Debt
    July 24, 2015
    How People Are Taking Advantage of Health Deals in the Recent Recession
    February 5, 2021
    Latest News
    Top HIPAA-Compliant Messaging Apps for Healthcare Teams
    June 25, 2025
    When Healthcare Ends, the Legal Process Begins: What Families Should Know About Probate and Medical Estates
    June 20, 2025
    Preventing Contamination In Healthcare Facilities Starts With Hygiene
    June 15, 2025
    Strengthening Healthcare Systems Through Clinical and Administrative Career Development
    June 13, 2025
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Tactical Mobile Device Security Measures to Meet HIPAA Compliance
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Medical Records > Tactical Mobile Device Security Measures to Meet HIPAA Compliance
Medical RecordsMobile Health

Tactical Mobile Device Security Measures to Meet HIPAA Compliance

onlinetech
Last updated: January 25, 2012 10:06 am
onlinetech
Share
6 Min Read
Smartphone Security
SHARE

Mobile devices are becoming ubiquitous in the healthcare industry – from quickly filing e-prescriptions to collecting and sending patient health information (PHI) directly to an EHR/EMR (electronic health or medical record) system, the use of smartphones, tablets and other portable devices is changing the quality of patient care for the better across the nation.

Mobile devices are becoming ubiquitous in the healthcare industry – from quickly filing e-prescriptions to collecting and sending patient health information (PHI) directly to an EHR/EMR (electronic health or medical record) system, the use of smartphones, tablets and other portable devices is changing the quality of patient care for the better across the nation.

But when it comes to securing your mobile devices and meeting strict HIPAA compliance standards, physicians and other healthcare professionals may not realize the security precautions they need to take to prevent a data breach and HIPAA violation.

One example of recommended best practices can be found in Yale University’s HIPAA guide for mobile device security (intended for its covered components, such as the Schools of Medicine, Health Services, etc.) including:

More Read

Image
Siemens Moves into Health Information Exchange
Interview/Podcast: HIT Interoperability
3 Factors Fueling Growth in Mobile Health Apps
Fitness and Competition Make It to Your Phone
Will 2015 Be the Breakout Year for mHealth?
Smartphone Security

Smartphone Security

  • Passwords – Yale recommends users have a password with a minimum of four characters. They also recommend implementing a lock-out setting after 10 failed attempts to enter a password.
  • Encryption – Data must be encrypted at rest and in transit, including backup data.
  • Message Storage – The storage limit is capped at 200 messages at one time or 14 days of messages.
  • Applications – All applications that create, store, access, send or receive PHI must meet HIPAA security standards. Yale also has a Security Design Review service that can check out any custom developed apps for compliance (although the website really needs to update its language regarding Application Service Providers and the required SAS 70 Type II documentation – SSAE 16/SOC 1 have since replaced the SAS 70 standard).
  • Software – Apply security updates frequently and use the most recent OS available.
  • Remote management and Tracking – Mobile devices must have a remote deletion and tracking feature or you have to sign up for a service that can wipe it if it is stolen or lost. For the iPhone, that can mean installing the Find My iPhone app. Yale provides a comprehensive  guide to locating and wiping iPhones, Blackberrys (read this, grammar nerds) and other smartphone devices.
  • No Circumvention – This refers to protecting the security of mobile devices by prohibiting users from using unauthorized software and hardware, etc.
  • Wireless – Yale requires the use of VPN services when using digital cellular to connect to the Yale network and if not using one of Yale’s cell carriers. For Bluetooth™, passwords or PINs are required to secure connections.
  • Thumb drives and Other Portable Media Devices – Storing PHI is prohibited unless the devices meet the Yale encryption standards.
  • File-sharing – Users that need to send or exchange PHI outside of the network have to use a secure file transfer tool, or secure file transfer protocol (SFTP).
  • Servers – Naturally Yale recommends using their IT department-owned servers to store all PHI. Their requirements are aligned with the HIPAA breach notification rules that require reports of data breaches if it affects 500 or more patients.
  • Privacy Filters – Computer screens that display PHI must have privacy filters installed if they’re viewable by the public.
  • Device Disposal – When upgrading or getting rid of your mobile devices, you must first securely destroy or delete PHI.
  • Email – Configuring email accounts to auto-forward to a non-Yale email account is prohibited if the email account may have PHI in its inbox.

This is a great start when it comes to documenting and specifying the security measures your organization needs to take, but don’t just copy and paste these policies. Every company has different needs that require a customized plan to keep PHI safe.

Also, not every device is created equal. Last year, BGR.com found a major security flaw in the security lock design of AT&T’s Samsung Galaxy S II cellphone that left it open to a simple workaround, allowing users to bypass the PIN or unlock feature. If you tap the lock button to wake it, wait for it to time out and go black, then tap the lock button again, the phone is suddenly accessible and the PIN rendered useless.

Make sure you know your device and its features, and deploy similar security measures as found above to stay compliant even on the go.

For more on IT security and best practices, read HIPAA Compliant IT Security and Best Practices. Or for more about smartphone security, read Mobile Security: How Safe is Your Data?

References:
Yale University’s HIPAA Security Updates and Reminders
Major Security Flaw Lets Anyone Bypass AT&T Samsun Galaxy S II Security

  

TAGGED:HIPAA violationsmobile devices
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

women dental care
What Is a Smile Makeover and How Much Does It Cost?
Dental health
June 30, 2025
HIPAA-Compliant Messaging Apps
Top HIPAA-Compliant Messaging Apps for Healthcare Teams
Global Healthcare Policy & Law Technology
June 25, 2025
recovering from injury
Rebuilding After Injury: Path to Physical and Emotional Recovery
News
June 22, 2025
scientist using microscope
When Healthcare Ends, the Legal Process Begins: What Families Should Know About Probate and Medical Estates
Global Healthcare
June 18, 2025

You Might also Like

Global HealthcareHealth careHealth ReformHospital AdministrationMedical EducationMedical EthicsMedical RecordsNewsPolicy & LawPublic HealthUncategorized

8 Of The Most Bizarre Medical Malpractice Cases Out There

December 11, 2018

FCC Names New Director of Healthcare Initiatives

June 18, 2013
HIPAA Privacy Rule Overview
Medical Records

A Summary of the HIPAA Privacy Rule

April 27, 2014
benefits outsourcing medical billing
FinanceGlobal HealthcareHospital AdministrationMedical Records

Benefits of Outsourcing Your Medical Claims Processing

October 6, 2014
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?