Hipaa Security Rule for Mobile Devices

972 WordsApr 13, 20134 Pages
According to a recent survey of physicians, an estimate of 83% own at least one mobile device and one in four doctors use smartphones and computers in their medical practice (Barrett, 2011). There is a great concern that protected health information (PHI) may be compromised by the use of mobile devices under the Health Insurance Portability and Accountability Act (HIPAA). The HIPAA law is in effect to secure patient medical records are kept confidential and safe. The increase of patients and health care practitioners communicating not only with the patient and other medical professionals using mobile devices raises security issues of protected health information (PHI). The HIPAA Security Rule requires reasonable safeguards to protect…show more content…
The rapid growth of mobile devices offers health care providers a convenient and simple way to communicate and access medical records. They are vulnerable to theft and loss due to the size and portability which makes the opportunity for thieves to take devices that are highly visible. “The most common form of security breach is the theft of mobile devices” (Barrett, 2011, Para 3). The Security Rule specifies covered entities to be held accountable for the actions of their employees. In the security series technical safeguards are extremely important due to technology advancements. The security rule describes technical safeguards as “the technology and the policy and procedures for its use that protect electronic health information (ePHI) and control access to it” (HIPAA Security Series, 2007). The rule allows covered entities to implement reasonable and appropriate security measures for its organization using software in order to safeguard sensitive information. Standards are access control, audit controls, integrity, and personal or entity authentication and transmission security. Examples of technical safeguards are as follows: • Brick the mobile device when it is lost or stolen; the device will no longer function and it can be temporary or permanently. Back up data in cloud storage so personal data isn’t lost. • Purchasing cyber liability insurance; organizations can
Open Document