Phoenix IT Support

Phoenix Computer Specialists are your local tech support specialists. Contact Us today for all your “Valley Of The Sun” IT and computer support needs.

Do you have an immediate need?

 Yes No

Enter Word Verification

captcha


Testimonials

What do you like most about our services?

Communication.  On-site, e-mail, and telephone updates.  The online service portal further helps facilitate the communications process.

Tell us about a specific experience with us that you were happy with.

Friendly, personal service.  Midnight, middle of the week, I'm attending to a server error and Dave and Dianne show up because they "were just down the street."

What are the biggest benefits you've received or experience since hiring us?

1. Technical advisement.  Staff is able to communicate with me at "my" level.

2. Weekly support, updates, and "TLC" (our machines and me!).

Fire Chief Jim Haner
Sun City Fire District
Read more››
Your Phoenix Microsoft Partner

Phoenix Computer Support

What HIPAA Compliance Risks Is Your Business Exposed To When Using Mobile Devices?

X

Mobile Security HIPAACommunicating with patients via mobile devices, such as a Blackberry or iPhone, has become a fast-growing trend among health care providers. A recent survey of almost 3,800 physicians revealed that an estimated 83% of them own at least one mobile device, and one in four use both smartphones and tablet computers in their medical practice.

According to The Risk of Regulated Data on Mobile Devices & in the Cloud, an insightful study explaining and documenting the risks of mobile device use, many organizations don’t take the necessary steps to protect patient information on their mobile devices, as well as data stored in the cloud.

Most organizations don’t understand how much protected health information (PHI) and other regulated data is actually stored on their mobile devices. In fact, 54% of respondents have had an average of five data-breach incidents, which involved the loss or theft of a mobile device that contained PHI.

Due to their small size and portability, mobile devices are particularly vulnerable to loss and theft, and the most common form of security breach is the theft of mobile devices. Recently, a survey of 600 U.S. hospital executives, physician organizations, and health insurers found that theft accounted for 66% of the data breaches reported over the past two years.

Mobile devices offer health care providers a convenient, more user-friendly way of communicating with their patients and accessing health records; and covered entities have quickly adopted the use of mobile devices for the exchange of electronic PHI (ePHI). However, this should be of concern because the HIPAA Security Rule specifies that covered entities are “accountable for the actions of their workforce.”

Using mobile devices to access ePHI raises risks to health care providers, such as:

  • Encryption: When data stored on personal mobile devices isn’t encrypted, it can be viewed and shared by anyone who has access to the mobile device.
  • Authentication: Typically, mobile device users don’t enter a password or provide biometric identification to access information that’s stored on their device. This lack of authentication on mobile devices is dangerous because any user is can access ePHI stored on the device.
  • Wi-Fi Connection: Using public or unsecure Wi-Fi or cellular networks to send or receive information could easily expose ePHI, unless mobile device users connect to a secure website prior to transmitting data, or connect using a VPN (Virtual Private Networking); which encrypts data sent and received on the mobile device.

While the HIPAA Security Rule allows health care providers and covered entities to communicate electronically with patients, the law still requires them to “apply reasonable safeguards when doing so.”

Health care providers and their employees must understand that the Security Rule “requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.”

If you’re unsure about the data stored on your employee’s tablets, laptops, and smartphones; it’s going to be significantly harder to protect ePHI. A good recommendation is to encrypt all of these mobile devices.

Encryption is easy and inexpensive to implement, and it’s a safe harbor under the HIPAA Security Rule; it allows organizations to avoid the required breach notification in the event of a security breach.

Organizations must also perform a Risk Analysis, in order to determine the likelihood of various risks, and what additional security measures need to be implemented to ensure ePHI remains protected.

Your healthcare practice must have a technology company that meets HIPAA compliance standards.  Ensure you have a technology partner who can take care of all your HIPAA consulting needs.  We are here to help you.

 

 

Comments are closed.